Analysis

  • max time kernel
    124s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2025, 11:14

General

  • Target

    c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe

  • Size

    2.0MB

  • MD5

    ef087515e2c4d82f09072c006b871fd9

  • SHA1

    b99b91e36f39ce797b38bf7111a3a20293d6c98d

  • SHA256

    c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02

  • SHA512

    cf3d24be2a44073da9965095a5ca322350d77887ce919b31959080874c67d87c295545259b5afa93fb77d77c856aff18ac67d264b4e658e296d387b6190680ca

  • SSDEEP

    49152:iYSRnUkK3t97LFnCT30FffPQbNHhFqr6LcjDHvv/OS6pTa6w:J4nUk8G3MHYPsrPzj6han

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://jumpstarbt.live/trop

https://soursopsf.run/gsoiao

https://changeaie.top/geps

https://easyupgw.live/eosz

https://liftally.top/xasj

https://upmodini.digital/gokk

https://salaccgfa.top/gsooz

https://zestmodp.top/zeda

https://xcelmodo.run/nahd

https://clarmodq.top/qoxo

https://uchangeaie.top/geps

https://reboundui.live/aomgd

https://jrxsafer.top/shpaoz

https://krxspint.digital/kendwz

https://rhxhube.run/pogrs

https://grxeasyw.digital/xxepw

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://xrfxcaseq.live/gspaz

https://ywmedici.top/noagis

Extracted

Family

darkvision

C2

82.29.67.160

Attributes
  • url

    http://107.174.192.179/data/003

    https://grabify.link/ZATFQO

    http://107.174.192.179/clean

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 8 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe
    "C:\Users\Admin\AppData\Local\Temp\c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Users\Admin\AppData\Local\Temp\10512750101\a725d0994f.exe
        "C:\Users\Admin\AppData\Local\Temp\10512750101\a725d0994f.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1108
      • C:\Users\Admin\AppData\Local\Temp\10514460101\D3fQA0J.exe
        "C:\Users\Admin\AppData\Local\Temp\10514460101\D3fQA0J.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1536
      • C:\Users\Admin\AppData\Local\Temp\10530610101\wjtk7Ga.exe
        "C:\Users\Admin\AppData\Local\Temp\10530610101\wjtk7Ga.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4064
      • C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe
        "C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5208
        • C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe
          "C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
            5⤵
            • Drops file in Program Files directory
            • Checks processor information in registry
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Modifies registry class
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2004
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x2ec,0x7ffad67af208,0x7ffad67af214,0x7ffad67af220
              6⤵
                PID:1920
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:3
                6⤵
                  PID:3672
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2272,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:2
                  6⤵
                    PID:2456
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2624,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:8
                    6⤵
                      PID:824
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:1
                      6⤵
                        PID:5808
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:1
                        6⤵
                          PID:2484
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3456,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:1
                          6⤵
                            PID:6032
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5084,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:8
                            6⤵
                              PID:3408
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4620,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3720 /prefetch:8
                              6⤵
                                PID:5316
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5320,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:8
                                6⤵
                                  PID:3056
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:8
                                  6⤵
                                    PID:3980
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:8
                                    6⤵
                                      PID:5388
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5972,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5984 /prefetch:8
                                      6⤵
                                        PID:5924
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5992,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:8
                                        6⤵
                                          PID:4284
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6264,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:1
                                          6⤵
                                            PID:5216
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6124,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:1
                                            6⤵
                                              PID:3452
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=4960,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:1
                                              6⤵
                                                PID:3552
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6648,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:1
                                                6⤵
                                                  PID:5616
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5028,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6768 /prefetch:1
                                                  6⤵
                                                    PID:7108
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=3612,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:1
                                                    6⤵
                                                      PID:4064
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3628,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:8
                                                      6⤵
                                                        PID:7764
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:8
                                                        6⤵
                                                          PID:7780
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3644,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=6728 /prefetch:8
                                                          6⤵
                                                            PID:7800
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5268,i,9836671185884290992,8241828024869208640,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:8
                                                            6⤵
                                                              PID:8344
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                            5⤵
                                                              PID:1544
                                                        • C:\Users\Admin\AppData\Local\Temp\10534240101\9sWdA2p.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10534240101\9sWdA2p.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5312
                                                        • C:\Users\Admin\AppData\Local\Temp\10534250101\6876dbb135.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10534250101\6876dbb135.exe"
                                                          3⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3020
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 716
                                                            4⤵
                                                            • Program crash
                                                            PID:208
                                                        • C:\Users\Admin\AppData\Local\Temp\10534260101\D3fQA0J.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10534260101\D3fQA0J.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3512
                                                        • C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          PID:6044
                                                          • C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10534270101\lWUwEmq.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            PID:4704
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                              5⤵
                                                                PID:3448
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=lWUwEmq.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                                5⤵
                                                                  PID:7092
                                                            • C:\Users\Admin\AppData\Local\Temp\10534280101\UZPt0hR.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10534280101\UZPt0hR.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: MapViewOfSection
                                                              PID:5020
                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                4⤵
                                                                  PID:2872
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                    5⤵
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1280
                                                                • C:\Windows\system32\svchost.exe
                                                                  "C:\Windows\system32\svchost.exe"
                                                                  4⤵
                                                                  • Downloads MZ/PE file
                                                                  • Adds Run key to start application
                                                                  PID:228
                                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    PID:4676
                                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                    5⤵
                                                                    • Deletes itself
                                                                    • Executes dropped EXE
                                                                    PID:4340
                                                                    • C:\Users\Admin\AppData\Local\Temp\{f12c11ec-bc93-488c-ac26-8ec0cfd80b50}\3f2b9ba.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\{f12c11ec-bc93-488c-ac26-8ec0cfd80b50}\3f2b9ba.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:8604
                                                                      • C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\98115807.exe
                                                                        C:/Users/Admin/AppData/Local/Temp/{b82a663d-898c-4dfb-8f7a-29940880528e}/\98115807.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                        7⤵
                                                                        • Drops file in Drivers directory
                                                                        • Sets service image path in registry
                                                                        • Executes dropped EXE
                                                                        • Impair Defenses: Safe Mode Boot
                                                                        • Loads dropped DLL
                                                                        • Adds Run key to start application
                                                                        • Enumerates connected drives
                                                                        • Writes to the Master Boot Record (MBR)
                                                                        • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious behavior: LoadsDriver
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:6372
                                                              • C:\Users\Admin\AppData\Local\Temp\10534290101\fd67EIq.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10534290101\fd67EIq.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:13168
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "setup" /t REG_SZ /d "C:\Users\Admin\AppData\Local\setup.exe"
                                                                  4⤵
                                                                    PID:1840
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "setup" /t REG_SZ /d "C:\Users\Admin\AppData\Local\setup.exe"
                                                                      5⤵
                                                                        PID:11300
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                      4⤵
                                                                        PID:11484
                                                                    • C:\Users\Admin\AppData\Local\Temp\10534300101\qhjMWht.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10534300101\qhjMWht.exe"
                                                                      3⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:7288
                                                                    • C:\Users\Admin\AppData\Local\Temp\10534310101\wjtk7Ga.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10534310101\wjtk7Ga.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetThreadContext
                                                                      PID:8100
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                        4⤵
                                                                          PID:8140
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                          4⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:8152
                                                                      • C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe"
                                                                        3⤵
                                                                          PID:220
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-E4PDD.tmp\86f01fee5f.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-E4PDD.tmp\86f01fee5f.tmp" /SL5="$1001DA,28467627,844800,C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe"
                                                                            4⤵
                                                                              PID:8176
                                                                              • C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe
                                                                                "C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"
                                                                                5⤵
                                                                                  PID:7160
                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-VT8QT.tmp\KMSpico.tmp
                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-VT8QT.tmp\KMSpico.tmp" /SL5="$301D4,2952592,69120,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"
                                                                                    6⤵
                                                                                      PID:6636
                                                                                  • C:\Users\Admin\AppData\Roaming\MyApp\core.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\MyApp\core.exe"
                                                                                    5⤵
                                                                                      PID:12164
                                                                                    • C:\Users\Admin\AppData\Roaming\MyApp\info.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\MyApp\info.exe"
                                                                                      5⤵
                                                                                        PID:11916
                                                                                      • C:\Users\Admin\AppData\Roaming\MyApp\core.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\MyApp\core.exe"
                                                                                        5⤵
                                                                                          PID:11944
                                                                                        • C:\Users\Admin\AppData\Roaming\MyApp\info.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\MyApp\info.exe"
                                                                                          5⤵
                                                                                            PID:11952
                                                                                      • C:\Users\Admin\AppData\Local\Temp\10534350101\b89387d21e.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\10534350101\b89387d21e.exe"
                                                                                        3⤵
                                                                                          PID:7716
                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                            4⤵
                                                                                              PID:7452
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10534360101\096e826503.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10534360101\096e826503.exe"
                                                                                            3⤵
                                                                                              PID:11252
                                                                                            • C:\Users\Admin\AppData\Local\Temp\10534370101\5660a968c5.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\10534370101\5660a968c5.exe"
                                                                                              3⤵
                                                                                                PID:6680
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                  4⤵
                                                                                                    PID:12544
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3020 -ip 3020
                                                                                              1⤵
                                                                                                PID:4996
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                1⤵
                                                                                                  PID:5016
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                                                                  1⤵
                                                                                                    PID:1904
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                                                                      2⤵
                                                                                                        PID:1740
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                      1⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:3520
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                      1⤵
                                                                                                        PID:4812
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                        1⤵
                                                                                                          PID:1728
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{ea661f7e-8e7e-46a1-bf0f-6304a077e374}\d42ccd29-16b3-48ae-9e91-bf9b75719b0e.cmd"
                                                                                                          1⤵
                                                                                                            PID:9604
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10612
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12300
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:12360
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:6952
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12656
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12716
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12780
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:12832
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:3828
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:5488
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:5928
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:11140
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:11080
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:11032
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:10956
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10900
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:10848
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10792
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10736
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10684
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:10632
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:10580
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10520
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10468
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10416
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10360
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:10308
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10256
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:6364
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:10192
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10140
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10088
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:10036
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9980
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:9928
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9788
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9732
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9680
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9612
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9568
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9508
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9456
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9404
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:9352
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9300
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:9240
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:6320
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9164
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:9112
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:9068
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8872
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8820
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8768
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8712
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:8664
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8608
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8560
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8504
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8452
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:8240
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:6316
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:6276
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:7688
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:1052
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12436
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:11796
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12520
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12660
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12728
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:12868
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:12924
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping 127.0.0.1 -n 1
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:13052
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                            1⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Executes dropped EXE
                                                                                                            • Identifies Wine through registry keys
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:10288
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\setup.exe
                                                                                                            1⤵
                                                                                                              PID:11356
                                                                                                            • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                              1⤵
                                                                                                                PID:12596

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v16

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_4e6f50f4a_arkmon.sys

                                                                                                                Filesize

                                                                                                                390KB

                                                                                                                MD5

                                                                                                                7c924dd4d20055c80007791130e2d03f

                                                                                                                SHA1

                                                                                                                072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                                SHA256

                                                                                                                406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                                SHA512

                                                                                                                ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                              • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                                                                Filesize

                                                                                                                1.9MB

                                                                                                                MD5

                                                                                                                09b76f9fe13fab0c3aa4cc61cc8c9946

                                                                                                                SHA1

                                                                                                                2b186dd57a68770b6ffbdc5034638f7176be66c2

                                                                                                                SHA256

                                                                                                                eb1ac70c8524ab7b487d8dccb2faceac4f447701a17a34a164b228828fe76f98

                                                                                                                SHA512

                                                                                                                5ce231d18dda1575826cf4499603499ab5e1fa34ac23581336eb050388b28f3bb65885efd4a75037cae5a1968d938ce7c9a3e68f4aa2be916efd709c32710f50

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                Filesize

                                                                                                                280B

                                                                                                                MD5

                                                                                                                65044109d1beb8ed8d59560642cbc519

                                                                                                                SHA1

                                                                                                                0084485b0aa26069232fab51ee603682e8edfd17

                                                                                                                SHA256

                                                                                                                a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d

                                                                                                                SHA512

                                                                                                                96dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000079

                                                                                                                Filesize

                                                                                                                43KB

                                                                                                                MD5

                                                                                                                e776697ebfebc164ef589a7d2e64e81b

                                                                                                                SHA1

                                                                                                                9fffd53a23922e685da50f5ce22e7cc2edb004e0

                                                                                                                SHA256

                                                                                                                1a4f0a54f85f1cb4a9b13e91623153d1c078960884fe04076aa6df012e4599cb

                                                                                                                SHA512

                                                                                                                877d9f98cce36137433181d56baf3da201370cfea1b81fec74cb9f545c4d764e6440de3b1144f0046149faab0b024fd46f6f1930dae8bb0ac15eae2519a02ac4

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_00007a

                                                                                                                Filesize

                                                                                                                33KB

                                                                                                                MD5

                                                                                                                1478de9c94a368d7ed03d50bb6005cdf

                                                                                                                SHA1

                                                                                                                afdcefbe26aa59c0e4ae668cf422adcf589461a8

                                                                                                                SHA256

                                                                                                                81cf44a40792ce2cc46ea896bbf06a91687ca4c25faee4e67e470a7d61a77914

                                                                                                                SHA512

                                                                                                                dc980bc3355ddd8096f8751c9bb51f1e296322eaa5d4a9f20588690c3e799eb9aaec823fdccb098c53f4be978614e7980c419bb9ce7cf6b66c3db9515d9bf80c

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_00007b

                                                                                                                Filesize

                                                                                                                34KB

                                                                                                                MD5

                                                                                                                522037f008e03c9448ae0aaaf09e93cb

                                                                                                                SHA1

                                                                                                                8a32997eab79246beed5a37db0c92fbfb006bef2

                                                                                                                SHA256

                                                                                                                983c35607c4fb0b529ca732be42115d3fcaac947cee9c9632f7cacdbdecaf5a7

                                                                                                                SHA512

                                                                                                                643ec613b2e7bdbb2f61e1799c189b0e3392ea5ae10845eb0b1f1542a03569e886f4b54d5b38af10e78db49c71357108c94589474b181f6a4573b86cf2d6f0d8

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_00007c

                                                                                                                Filesize

                                                                                                                69KB

                                                                                                                MD5

                                                                                                                938aba7aabbec04a0180a78f3213cf7f

                                                                                                                SHA1

                                                                                                                32af549e781ce0183da02afb98e27e476e129b96

                                                                                                                SHA256

                                                                                                                f998860d950a9aa57a97f1d57378194153712be01683ff502c44b9f516ac36bc

                                                                                                                SHA512

                                                                                                                2d8c2ffddb0bea4396817545f08184111ce614b897e3dc18b2f0639e9a8113a5450d396213bdf70c830b7b8217af7c4c7b8143d2e4a88964533216b9eae08ced

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_00007d

                                                                                                                Filesize

                                                                                                                506KB

                                                                                                                MD5

                                                                                                                28ddff24e4ed12d19034048dd693e051

                                                                                                                SHA1

                                                                                                                f53dd3dbdd4643273399051b9dd0f187992e606d

                                                                                                                SHA256

                                                                                                                904402faa420609a73320f5b75f8f81826159f9bc20d67d56d5fad963091dd0c

                                                                                                                SHA512

                                                                                                                78f5ce9a540e514a0618799f221de79e32aa903086f99a56e504b0a9f270e430f7a3963173181007fac718a601c6b10a70c6324132ce2b0f5552a52437ff91af

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_00007e

                                                                                                                Filesize

                                                                                                                17KB

                                                                                                                MD5

                                                                                                                240c4cc15d9fd65405bb642ab81be615

                                                                                                                SHA1

                                                                                                                5a66783fe5dd932082f40811ae0769526874bfd3

                                                                                                                SHA256

                                                                                                                030272ce6ba1beca700ec83fded9dbdc89296fbde0633a7f5943ef5831876c07

                                                                                                                SHA512

                                                                                                                267fe31bc25944dd7b6071c2c2c271ccc188ae1f6a0d7e587dcf9198b81598da6b058d1b413f228df0cb37c8304329e808089388359651e81b5f3dec566d0ee0

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_00007f

                                                                                                                Filesize

                                                                                                                89KB

                                                                                                                MD5

                                                                                                                7a6ebb3193c0c23eaf22c4df76dbf3f5

                                                                                                                SHA1

                                                                                                                8c782bad9eecf80387a61bff578bf5c20e70ed80

                                                                                                                SHA256

                                                                                                                b78264730ff0cb3d2b2eec16a9b129a9b633c704f5178613ca7271be967fcecb

                                                                                                                SHA512

                                                                                                                17aab5b91a271555fa983312156f2e99d0bff3ae02963b2e73a57b30c4fbb5faf482acac34b77d8dfc6daa28d2c1c2282eba921f7c32fd791b0a98a9e2532083

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000080

                                                                                                                Filesize

                                                                                                                272KB

                                                                                                                MD5

                                                                                                                5f524e20ce61f542125454baf867c47b

                                                                                                                SHA1

                                                                                                                7e9834fd30dcfd27532ce79165344a438c31d78b

                                                                                                                SHA256

                                                                                                                c688d3f2135b6b51617a306a0b1a665324402a00a6bceba475881af281503ad9

                                                                                                                SHA512

                                                                                                                224a6e2961c75be0236140fed3606507bca49eb10cb13f7df2bcfbb3b12ebeced7107de7aa8b2b2bb3fc2aa07cd4f057739735c040ef908381be5bc86e0479b2

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000081

                                                                                                                Filesize

                                                                                                                21KB

                                                                                                                MD5

                                                                                                                caf225f7adbe3c2452a62dd3fde23661

                                                                                                                SHA1

                                                                                                                cbf6ac9c6cf00094fc79e189096a6baa3ff40631

                                                                                                                SHA256

                                                                                                                026b86f6177fe1eafc143d0bb1841929df81cded8df3894dbca28b940c9153c7

                                                                                                                SHA512

                                                                                                                455c1f42bce6849e4065c84cf6368f828e2a8cc3f853129e0f2f019d36a54c1e282823283a6cf4b29ee792d29a99648e3a97a4e9290997263048e9fdeb56a57e

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000082

                                                                                                                Filesize

                                                                                                                259KB

                                                                                                                MD5

                                                                                                                34504ed4414852e907ecc19528c2a9f0

                                                                                                                SHA1

                                                                                                                0694ca8841b146adcaf21c84dedc1b14e0a70646

                                                                                                                SHA256

                                                                                                                c5327ac879b833d7a4b68e7c5530b2040d31e1e17c7a139a1fdd3e33f6102810

                                                                                                                SHA512

                                                                                                                173b454754862f7750eaef45d9acf41e9da855f4584663f42b67daed6f407f07497348efdfcf14feeeda773414081248fec361ac4d4206f1dcc283e6a399be2f

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000083

                                                                                                                Filesize

                                                                                                                28KB

                                                                                                                MD5

                                                                                                                e35d41d29bcacc8474c96fec87ab3760

                                                                                                                SHA1

                                                                                                                04c4cd7c7b0efbe9a3831b1ed2db8fe0dc468818

                                                                                                                SHA256

                                                                                                                2f0454db4dd937f7fe4f0b0d1969f4057c631ec5e102cb3209f79b08dfad40a1

                                                                                                                SHA512

                                                                                                                12e19dba0a58f9e7a50f5bc55ebebf58fa9bddf8ea2f25e1c14ad15bc1ef65f4b087846ad8172d714dbc76995c9188abfad08bfaa650be08a5e8ca0de51ed619

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000084

                                                                                                                Filesize

                                                                                                                31KB

                                                                                                                MD5

                                                                                                                10a3bf6e6cac566e16d57d26835df69b

                                                                                                                SHA1

                                                                                                                f12d0b459f4f1f5af1e227a074218bb6012eb0bc

                                                                                                                SHA256

                                                                                                                1e7e4d23dc95b01cfc94093235553b37e9ffef82ed1f89f555541883a98c7f03

                                                                                                                SHA512

                                                                                                                05e2769b63b6e48684edfeda80115c683de4647537abb4b76fa87799a914e2ae5825e6fb220ac8471db3d071d74c1ecbcdbef783abe2bb732530407a92b9c65c

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                Filesize

                                                                                                                3KB

                                                                                                                MD5

                                                                                                                74bd5fc691613471415cf5aa9f6464a9

                                                                                                                SHA1

                                                                                                                cc5a146ad961d9cf58a491e23f4903f0cde4c753

                                                                                                                SHA256

                                                                                                                5954606af3f9c5e0e2c744515218073be688deb8a40d57f25ddbe71098a79611

                                                                                                                SHA512

                                                                                                                e750baed13de9c95c8131a6638401b7c52f9d1d160a75d04e2f759c49b06d6ba7be4181d002ce8d34e761347bf7a563d3fc1769b7bebf56a3645ad3cac4d3ced

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58c781.TMP

                                                                                                                Filesize

                                                                                                                3KB

                                                                                                                MD5

                                                                                                                f63c46d5a60e4ecb968342d380016bad

                                                                                                                SHA1

                                                                                                                9d8d0313746ba491e97ac453d731a68b47aa5ce4

                                                                                                                SHA256

                                                                                                                6aae19bbbb8bac04af7d5ae90a556304ab110d1157a7f77a404c0045e092aa73

                                                                                                                SHA512

                                                                                                                8a21b52d0bcb9e58253a9b6fdde41b9eaf4382d399635fbf6922d82f66c223dc0deb97b724cc8fe979c74c49522e73df0bed4f0161878c5aea97e1bd78fa5de9

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                                                Filesize

                                                                                                                2B

                                                                                                                MD5

                                                                                                                99914b932bd37a50b983c5e7c90ae93b

                                                                                                                SHA1

                                                                                                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                SHA256

                                                                                                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                SHA512

                                                                                                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                                Filesize

                                                                                                                107KB

                                                                                                                MD5

                                                                                                                2b66d93c82a06797cdfd9df96a09e74a

                                                                                                                SHA1

                                                                                                                5f7eb526ee8a0c519b5d86c845fea8afd15b0c28

                                                                                                                SHA256

                                                                                                                d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954

                                                                                                                SHA512

                                                                                                                95e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                19e0c1a559c97bd2cae3684044c01256

                                                                                                                SHA1

                                                                                                                b38cbdcd3ac866a8be4bbc1649a9cf097ab4a822

                                                                                                                SHA256

                                                                                                                4157cb210029379df1804c25b65eb5dade76453965d956f3c16dcce538bc7523

                                                                                                                SHA512

                                                                                                                aad3918b4fff9c9ed523ae287ee46813a3717b917c0e43e3100608ca0bd5f5d18534211daf360ddd84966e466541d35a39cd21eede6b92587244d4d98e60d100

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                Filesize

                                                                                                                2B

                                                                                                                MD5

                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                SHA1

                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                SHA256

                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                SHA512

                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                Filesize

                                                                                                                40B

                                                                                                                MD5

                                                                                                                20d4b8fa017a12a108c87f540836e250

                                                                                                                SHA1

                                                                                                                1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                SHA256

                                                                                                                6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                SHA512

                                                                                                                507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                Filesize

                                                                                                                16KB

                                                                                                                MD5

                                                                                                                ae8ab9b1151ec0c80c1cec262fb5d1fb

                                                                                                                SHA1

                                                                                                                f58aa923452c70098abecb205caf0d627ace79f1

                                                                                                                SHA256

                                                                                                                cd47f2b862175218ade9bec1bbb571307ba5fe2320f986221a1eb9c697e74e77

                                                                                                                SHA512

                                                                                                                7172298397d455fd012b2f7a21c2d5192939f0f2f858f8fe9294de39b64a0f088f8fce21d243cc7da5dca9703b7dc4bc655315f36d756e33d7c0d335860b5c31

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                Filesize

                                                                                                                36KB

                                                                                                                MD5

                                                                                                                7d73c048264bc0c23b3c06abf4a9e575

                                                                                                                SHA1

                                                                                                                fb7b354305ebf1abdd3a7f0474fdb953e05d688d

                                                                                                                SHA256

                                                                                                                ca52b5b840c873992a1b56510dc48008b9d00449aeb9098b9aa32cf1bd1ec348

                                                                                                                SHA512

                                                                                                                f9c646db6195420ef7f5cbc50dba00ffe3ec6a7b0286091d7ff2cb1eca995ece3b52fa6a60f96741fcd404750dddcbb5ddd2b0de802e6f9c318c0bcb9f4ef78b

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                Filesize

                                                                                                                23KB

                                                                                                                MD5

                                                                                                                bbf5d91ef45d4fb97918612ca336b07f

                                                                                                                SHA1

                                                                                                                ab3cc11e6e3621fc355c78729997d74543097167

                                                                                                                SHA256

                                                                                                                ecad8b8fe2989b53ed6feb039f0ef61a4cf71f0282eb29c60f278d68ea1b6734

                                                                                                                SHA512

                                                                                                                8c75cd1ba1dd130eb084e13fc770fb9b5e8f445113df325e3edda10d323057e6b15518e47c7d89faa9e8b4e1a0de44d80cff3fcca47ccbaf20c5f42e1933470d

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                Filesize

                                                                                                                467B

                                                                                                                MD5

                                                                                                                2d168a1afee516885b1bdd74a310e45f

                                                                                                                SHA1

                                                                                                                4f219627de2464d3e191b25da28715329d860b6c

                                                                                                                SHA256

                                                                                                                8728f06630517fee0820d4ce700e4e741511778285d0d7e3666d57f98b7f2a93

                                                                                                                SHA512

                                                                                                                d151a503df61894f17031569726cdb896e885dd6a6f0941f14905130db15409032d65db9bf344a75ac4719eed4f3e7bc900354d1544d5024ac868fa8b6bae042

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                Filesize

                                                                                                                23KB

                                                                                                                MD5

                                                                                                                6666266e400f312d42ec8282e395e0ea

                                                                                                                SHA1

                                                                                                                8790041bdc905c616ab51534c2ef29d6df05fb6f

                                                                                                                SHA256

                                                                                                                aba806fc6933cb8fbe2be58b87a0ce6f53786230d4f3775ebcf409f25b82446a

                                                                                                                SHA512

                                                                                                                0fe2a5f403850a3d6388c0563a43780ac4669e262e92c5727f6d3b8f2cf4a336966844def0d97120a7dac363ae32787a8963191827f95af31e658dbb7b723602

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                Filesize

                                                                                                                902B

                                                                                                                MD5

                                                                                                                c9824f66a38876270edb8e4476f9a931

                                                                                                                SHA1

                                                                                                                df6f6f29ff762bdba03cf9c6cefa1e179efa1414

                                                                                                                SHA256

                                                                                                                d9952e7c6e58406d3d2de081340b2b08880e2bffa09bbf3531b917754dbb9a1e

                                                                                                                SHA512

                                                                                                                d72b751e1e6a49011cc1ad875289a58962c0169dbb89f0c0eedffc821ddf758831ecb536eaf5845a250e534e0d8d1fba4c52c57a3ffbeabd7322516b438146b8

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                                                                Filesize

                                                                                                                19KB

                                                                                                                MD5

                                                                                                                41c1930548d8b99ff1dbb64ba7fecb3d

                                                                                                                SHA1

                                                                                                                d8acfeaf7c74e2b289be37687f886f50c01d4f2f

                                                                                                                SHA256

                                                                                                                16cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502

                                                                                                                SHA512

                                                                                                                a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                Filesize

                                                                                                                54KB

                                                                                                                MD5

                                                                                                                332d35447e940d0687b30daa23535ad4

                                                                                                                SHA1

                                                                                                                8bdbe8e5ed2cd93229d4323c8f3d03de82dfd466

                                                                                                                SHA256

                                                                                                                038e3bfea58b0c02d1923606c6a7de2de05345f818307212b4ec3f10ba3efefd

                                                                                                                SHA512

                                                                                                                382327481916d019a3c0b82485756def169e7d3645f1ac01eb96f0495b28e959f987d52e037f3a1125c29be57d0204df34bb8f62cd82010b28c55c47fe4f92d5

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                                MD5

                                                                                                                3b0f53a156cfb4020553a9f1da7ce64d

                                                                                                                SHA1

                                                                                                                575bdab25e99c898a5b64bbb4b5957e6428cfdc6

                                                                                                                SHA256

                                                                                                                2cffadc803ed6913cf7bd78ef829544baf4f85886da87b22d9c5b19b8acc9161

                                                                                                                SHA512

                                                                                                                8d78bd40ed0a1cc5e2abadc0856c7cd4e1bf901219c456e77ee3282f48d6eb2f77dfcda4d383363a7a11afd52ed3f4e6a4d20fa5179190cac3ef6e422cd238ab

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\b90ce9af-ee43-47db-8437-6c79a756c775.tmp

                                                                                                                Filesize

                                                                                                                41KB

                                                                                                                MD5

                                                                                                                082e8f869fdb126315d72eadb7eccdaf

                                                                                                                SHA1

                                                                                                                9514c6ed0907dac7a472ca3f7b0fb38b68115ebd

                                                                                                                SHA256

                                                                                                                5ecd4cd8d077eee3da14c4be02a3e13dfb5185c91578c78082f4806937a6c86d

                                                                                                                SHA512

                                                                                                                57f890598c33f0009cc384a53e55fbad593af6c6304df8e880ab8e45c45fb703819e07a28fb3f01e33485bc8208054bcf5cd17d163c20a86c2d3c105eef109e6

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                Filesize

                                                                                                                152KB

                                                                                                                MD5

                                                                                                                dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                SHA1

                                                                                                                d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                SHA256

                                                                                                                fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                SHA512

                                                                                                                65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                ebed7f4c3f3094469703a1d262892b65

                                                                                                                SHA1

                                                                                                                a9e96ca078c3174f557f7bc6b63ec5acfa355d6a

                                                                                                                SHA256

                                                                                                                12cc0ba1bea6bce9e25a7bd768625cda8b728a916b1f4b64ab5eae36b5133634

                                                                                                                SHA512

                                                                                                                48358b1f1b000130241d59de3c795cc2416e46f1cbbafcd797cc587417e424f72e4c718816cb1430f453682f8714841b0c497ba5756e79f247f44d07554f919b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10512750101\a725d0994f.exe

                                                                                                                Filesize

                                                                                                                2.1MB

                                                                                                                MD5

                                                                                                                17c9f37fe8c2b01370cb2a9464697351

                                                                                                                SHA1

                                                                                                                03d217ee6aa6383a8b61f550f945c69687e03192

                                                                                                                SHA256

                                                                                                                a4507a54200b84987456f9b2ea1f7a4ae9f1aedddc3beff51ac2127e025eb03b

                                                                                                                SHA512

                                                                                                                12c950b89813f17bf4db1e46d7445a7663a57ee50f4e52377f40c0d1e661ab3fcae909dc969cbab6c3135f414c26b7a2f749ae3697df9c5c4e4ffa25107bcc24

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10514460101\D3fQA0J.exe

                                                                                                                Filesize

                                                                                                                7.0MB

                                                                                                                MD5

                                                                                                                e130f55133c41e91984ba551d9316d28

                                                                                                                SHA1

                                                                                                                b3dc5d47c1f2dee238bd6b020cad759411ab5fdb

                                                                                                                SHA256

                                                                                                                b3cead0b7588d6fb88833bc5ae6d74338ab3727c5fec307d4332b36df8a50604

                                                                                                                SHA512

                                                                                                                90cde01dee2191a011811c80c6b6d978d4001a097493f72aceb84094dbfd59343beaa3a3d398f0c53bef0e9a1585f6b794dc5bb98e73ea58df2375310884f219

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10530610101\wjtk7Ga.exe

                                                                                                                Filesize

                                                                                                                1.2MB

                                                                                                                MD5

                                                                                                                a14da6f0e2c99c95fb0a9d8119ead545

                                                                                                                SHA1

                                                                                                                76b0e5532cff13732244078ceb2172fd5c59359d

                                                                                                                SHA256

                                                                                                                713fea7f14920d085472ba42d1f0f1e53c9a7e97a17dcdd3f050322c26536901

                                                                                                                SHA512

                                                                                                                7009e4ec7ca828ff006885f8e475d3d3df364f5c3fef4023226f8feb0dea83aedfc52b45cb2151f914ae36ffb4428b83c3697d6ef7aadb9810551a3b9e406e8d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534020101\lWUwEmq.exe

                                                                                                                Filesize

                                                                                                                969KB

                                                                                                                MD5

                                                                                                                0202dd8e050fb3a710058c27979616ce

                                                                                                                SHA1

                                                                                                                7d6483b579e0a967c9be38255daf8a1259f6a726

                                                                                                                SHA256

                                                                                                                d82a8853d27dcbff8ab358516c4719c77ae7e788dbdc28543ace7894ec1d37ae

                                                                                                                SHA512

                                                                                                                8c7d15c206247aceb43063257e0eab8dd71c0c446037d1240c43cbc07adeb08982016975edfad6b7728462ef190f7396cb73d477d51cf25f4cf343ccc1058411

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534240101\9sWdA2p.exe

                                                                                                                Filesize

                                                                                                                1.1MB

                                                                                                                MD5

                                                                                                                5adca22ead4505f76b50a154b584df03

                                                                                                                SHA1

                                                                                                                8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                                                                SHA256

                                                                                                                aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                                                                SHA512

                                                                                                                6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534280101\UZPt0hR.exe

                                                                                                                Filesize

                                                                                                                1.2MB

                                                                                                                MD5

                                                                                                                6ac21d5d2a54b525ecf721d6f80805ad

                                                                                                                SHA1

                                                                                                                cd2b809f222906c533ab712139101c6188a08552

                                                                                                                SHA256

                                                                                                                e4094a03164aecf804eef2b9690796761b195786062273eaeb8bf7be0c18045d

                                                                                                                SHA512

                                                                                                                cc6e30e7a62ee5c55b338b38467a9032129ae2ef0b6f7b1e0ff8b679936772c5e6f0d8b7341f06fb69fea310680c1b79f4a8282d8a1ebfe1f9cc4cc6605b2968

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534290101\fd67EIq.exe

                                                                                                                Filesize

                                                                                                                8.8MB

                                                                                                                MD5

                                                                                                                85dc6d6dcfa018c2f451cc0ca8c77458

                                                                                                                SHA1

                                                                                                                f7519fa0df4f69cbda5f3a7dfb4e457381f8e5c8

                                                                                                                SHA256

                                                                                                                acf4882beae2b481c9bbbe10900688099a1018de9a95217dd31243072ab8f93e

                                                                                                                SHA512

                                                                                                                93f7d1de428f45e3038960a83e1752863d69b21e4286eb25a2b02777e4161def6fb3275d219ed9cf044b73c4ba34c33f81fe52358c10d93a9000950dc7c0da79

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534300101\qhjMWht.exe

                                                                                                                Filesize

                                                                                                                1.8MB

                                                                                                                MD5

                                                                                                                155b5a37e0139ae41470d962cb52d724

                                                                                                                SHA1

                                                                                                                8205240e38cd52ceacf9ea8c3341df000e9d3d1e

                                                                                                                SHA256

                                                                                                                7d97bf7503ab66494f677393827135a6bab046e140994562b851af8e8e5e9d72

                                                                                                                SHA512

                                                                                                                91daf5395c85dad4894b350544e26767856b3af2e3e34f2eebe71410b9f9ceb7a88c518beda22ed280ca1efc90e045acd68ad37ae4ae01529e33433905632fc7

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534340101\86f01fee5f.exe

                                                                                                                Filesize

                                                                                                                28.1MB

                                                                                                                MD5

                                                                                                                8bb05367683f7234d44082d6d218eb93

                                                                                                                SHA1

                                                                                                                642be518acd284344d6b3a688508ad011fba5601

                                                                                                                SHA256

                                                                                                                64c648cb4e1778ea36c85eeeef3744ee724e1852b2cf0c02c30202db4c4a949c

                                                                                                                SHA512

                                                                                                                36de01e264cd36aa2a27d1d7f737d34838d38f7513df339cbef53e943d9cbf886ad054e74c73ef6013e0faff37031e0acbec90e18087a348bb3446b5f55864a3

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534350101\b89387d21e.exe

                                                                                                                Filesize

                                                                                                                1.2MB

                                                                                                                MD5

                                                                                                                10df43a9bcda80911d9e23b6cdb590cc

                                                                                                                SHA1

                                                                                                                e750427f684fe5539465ca69d7ec870a64b04d2e

                                                                                                                SHA256

                                                                                                                e0a860108cfd2512018cf3d093810822ccad69b6bd25f8f0fc6080f882e36d2c

                                                                                                                SHA512

                                                                                                                6875986d8d7ec4721fcf3f06295d8cd5d2e48f6f2825fcc64bee4d13cd2d3444cd2bf4a6d52e366ce65fae8a386b77727182cf6b175187f214b1033d694d322e

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534360101\096e826503.exe

                                                                                                                Filesize

                                                                                                                716KB

                                                                                                                MD5

                                                                                                                57a5e092cf652a8d2579752b0b683f9a

                                                                                                                SHA1

                                                                                                                6aad447f87ab12c73411dec5f34149034c3027fc

                                                                                                                SHA256

                                                                                                                29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                                                                SHA512

                                                                                                                5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534360101\096e826503.exe

                                                                                                                Filesize

                                                                                                                358KB

                                                                                                                MD5

                                                                                                                e604fe68e20a0540ee70bb4bd2d897d0

                                                                                                                SHA1

                                                                                                                00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                                                                SHA256

                                                                                                                6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                                                                SHA512

                                                                                                                996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534370101\5660a968c5.exe

                                                                                                                Filesize

                                                                                                                1.4MB

                                                                                                                MD5

                                                                                                                f3f9535109155498021e63c23197285f

                                                                                                                SHA1

                                                                                                                cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                                                                                                                SHA256

                                                                                                                1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                                                                                                                SHA512

                                                                                                                a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10534370101\5660a968c5.exe

                                                                                                                Filesize

                                                                                                                730KB

                                                                                                                MD5

                                                                                                                31aeed8d880e1c68a97f0d8739a5df8a

                                                                                                                SHA1

                                                                                                                d6f140d63956bc260639ab3c80f12a0e9b010ee9

                                                                                                                SHA256

                                                                                                                bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                                                                                                                SHA512

                                                                                                                bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\75e84334-d203-4661-bc75-72695487f9ac.tmp

                                                                                                                Filesize

                                                                                                                65KB

                                                                                                                MD5

                                                                                                                484fe39d0c4f0b8c54882f1fe70fb9bc

                                                                                                                SHA1

                                                                                                                14ebaf80bf82a604bd3767c328c9b7682d1f357d

                                                                                                                SHA256

                                                                                                                d5529e3bd947d15d61d78b51ac6f5fc0aa32c941651b4367883d1c985f92009d

                                                                                                                SHA512

                                                                                                                c06dcf3e018e5afa63adbe5c0e28a2ba84fb05f21f189b5fb9c0248367254f120c91a19d7b3da5f03c0a92c5ad47d76b4ffb033f294b5e7076bf55092f38cdea

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_evkgwamh.iis.ps1

                                                                                                                Filesize

                                                                                                                60B

                                                                                                                MD5

                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                SHA1

                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                SHA256

                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                SHA512

                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a8e51f45-c89e-44e2-bdac-fdf5de699fbf.tmp

                                                                                                                Filesize

                                                                                                                65KB

                                                                                                                MD5

                                                                                                                6736db005a2172c0cf40d43964e43a56

                                                                                                                SHA1

                                                                                                                cc593515abafd0c6b4c149ecb55daf338fe3121d

                                                                                                                SHA256

                                                                                                                29970f9dbe42bf24a1462124b917062697b07f8aff4945544e848b38c52ec2b4

                                                                                                                SHA512

                                                                                                                d420479c3c0b744a8f7cfb8181a7f888a629f4c05069599e808b759ce43925f896f0d14e9de264ffeda103a2431fa3902d0f1a121ca2670a3455a72351cc481b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                ef087515e2c4d82f09072c006b871fd9

                                                                                                                SHA1

                                                                                                                b99b91e36f39ce797b38bf7111a3a20293d6c98d

                                                                                                                SHA256

                                                                                                                c0dc0ad397149f0149431c30e44cced22a3ecc3d98056ac2e352c1a151655d02

                                                                                                                SHA512

                                                                                                                cf3d24be2a44073da9965095a5ca322350d77887ce919b31959080874c67d87c295545259b5afa93fb77d77c856aff18ac67d264b4e658e296d387b6190680ca

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\cv_debug.log

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                1c674015081a6cfa094c7f1542642f23

                                                                                                                SHA1

                                                                                                                275375e6bf11f171eb15d784d4abbe1c989cb3ab

                                                                                                                SHA256

                                                                                                                093f571e71ef6ca820818b3555543b9db3b0688eef73f3e4fbe54dc01a682445

                                                                                                                SHA512

                                                                                                                5875c45c16e35499a348cb78d01345ea9279dc7ab0f295a40f0c470eea323910cfcbaaaccd069029741bde91fbee5bc22dd6e4dfded3529776b6953d1f691b1b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                                                Filesize

                                                                                                                1.3MB

                                                                                                                MD5

                                                                                                                15bdc4bd67925ef33b926843b3b8154b

                                                                                                                SHA1

                                                                                                                646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                                                SHA256

                                                                                                                4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                                                SHA512

                                                                                                                eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\KVRT.exe

                                                                                                                Filesize

                                                                                                                2.6MB

                                                                                                                MD5

                                                                                                                3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                                SHA1

                                                                                                                c9b1b765249bfd76573546e92287245127a06e47

                                                                                                                SHA256

                                                                                                                5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                                SHA512

                                                                                                                38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\PERSIS~1.DB-

                                                                                                                Filesize

                                                                                                                48KB

                                                                                                                MD5

                                                                                                                6de7c98cf204da766f6bb98dc48efb38

                                                                                                                SHA1

                                                                                                                744e3523a7383f9d234b789a220d530819669641

                                                                                                                SHA256

                                                                                                                4f69c8e36d6588d0c31a11105db4c314c413d897af7536152bd1119c8639d170

                                                                                                                SHA512

                                                                                                                2cf41c3c120706d1da2c2a2304208ffa38118a0b25faf992eab065d30bd6968cdd54c0659cfe8b6cc249fe0e6fddf153349a1ad7351bf7017f3aac8fc83e937c

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\STORAG~2.KVD

                                                                                                                Filesize

                                                                                                                21KB

                                                                                                                MD5

                                                                                                                79c1700cae60b5751d1c17515fc36132

                                                                                                                SHA1

                                                                                                                36306e0bc12065025dfa653d89829f337bf9b284

                                                                                                                SHA256

                                                                                                                07f6365d517b5bf8d303a9bea882f5043ad480b5be68fac5cd94f106836480ab

                                                                                                                SHA512

                                                                                                                936c9d61c4575eeaac953e0a4fcf40a6237ea77c7884aecf19aa51c801c41eb8f004b65c4313f1adf61d68b9d3e2b1815edc602222125340f3217735912ba010

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\dbghelp.dll

                                                                                                                Filesize

                                                                                                                1.2MB

                                                                                                                MD5

                                                                                                                4003e34416ebd25e4c115d49dc15e1a7

                                                                                                                SHA1

                                                                                                                faf95ec65cde5bd833ce610bb8523363310ec4ad

                                                                                                                SHA256

                                                                                                                c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

                                                                                                                SHA512

                                                                                                                88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{b82a663d-898c-4dfb-8f7a-29940880528e}\dumpwriter.dll

                                                                                                                Filesize

                                                                                                                409KB

                                                                                                                MD5

                                                                                                                f56387639f201429fb31796b03251a92

                                                                                                                SHA1

                                                                                                                23df943598a5e92615c42fc82e66387a73b960ff

                                                                                                                SHA256

                                                                                                                e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c

                                                                                                                SHA512

                                                                                                                7bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e

                                                                                                              • C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe

                                                                                                                Filesize

                                                                                                                3.1MB

                                                                                                                MD5

                                                                                                                a02164371a50c5ff9fa2870ef6e8cfa3

                                                                                                                SHA1

                                                                                                                060614723f8375ecaad8b249ff07e3be082d7f25

                                                                                                                SHA256

                                                                                                                64c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a

                                                                                                                SHA512

                                                                                                                6c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326

                                                                                                              • C:\Windows\System32\drivers\4e6f50f4.sys

                                                                                                                Filesize

                                                                                                                368KB

                                                                                                                MD5

                                                                                                                990442d764ff1262c0b7be1e3088b6d3

                                                                                                                SHA1

                                                                                                                0b161374074ef2acc101ed23204da00a0acaa86e

                                                                                                                SHA256

                                                                                                                6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                                                                SHA512

                                                                                                                af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                                                              • C:\Windows\System32\drivers\klupd_4e6f50f4a_klark.sys

                                                                                                                Filesize

                                                                                                                355KB

                                                                                                                MD5

                                                                                                                9cfe1ced0752035a26677843c0cbb4e3

                                                                                                                SHA1

                                                                                                                e8833ac499b41beb6763a684ba60333cdf955918

                                                                                                                SHA256

                                                                                                                3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                                                                SHA512

                                                                                                                29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                                                              • C:\Windows\System32\drivers\klupd_4e6f50f4a_klbg.sys

                                                                                                                Filesize

                                                                                                                199KB

                                                                                                                MD5

                                                                                                                424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                                SHA1

                                                                                                                2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                                SHA256

                                                                                                                ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                                SHA512

                                                                                                                15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                              • C:\Windows\System32\drivers\klupd_4e6f50f4a_mark.sys

                                                                                                                Filesize

                                                                                                                260KB

                                                                                                                MD5

                                                                                                                66522d67917b7994ddfb5647f1c3472e

                                                                                                                SHA1

                                                                                                                f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                                                                SHA256

                                                                                                                5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                                                                SHA512

                                                                                                                921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                                                              • memory/228-759-0x000001E42D270000-0x000001E42D2E1000-memory.dmp

                                                                                                                Filesize

                                                                                                                452KB

                                                                                                              • memory/228-758-0x000001E42D270000-0x000001E42D2E1000-memory.dmp

                                                                                                                Filesize

                                                                                                                452KB

                                                                                                              • memory/228-752-0x000001E42D270000-0x000001E42D2E1000-memory.dmp

                                                                                                                Filesize

                                                                                                                452KB

                                                                                                              • memory/228-760-0x000001E42D270000-0x000001E42D2E1000-memory.dmp

                                                                                                                Filesize

                                                                                                                452KB

                                                                                                              • memory/228-750-0x00000000006D0000-0x00000000006D2000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/1108-45-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-687-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-40-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-46-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-44-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-37-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-39-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-149-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1108-89-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/1280-771-0x0000020660E30000-0x0000020660E52000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/1536-84-0x00000000009B0000-0x00000000009B1000-memory.dmp

                                                                                                                Filesize

                                                                                                                4KB

                                                                                                              • memory/1536-86-0x0000000003060000-0x00000000030C1000-memory.dmp

                                                                                                                Filesize

                                                                                                                388KB

                                                                                                              • memory/2732-129-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                                Filesize

                                                                                                                128KB

                                                                                                              • memory/3020-153-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/3020-152-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/3020-151-0x0000000000400000-0x00000000008C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.8MB

                                                                                                              • memory/3512-476-0x0000000003170000-0x00000000031D1000-memory.dmp

                                                                                                                Filesize

                                                                                                                388KB

                                                                                                              • memory/3520-486-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3520-474-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3900-18-0x00000000006A1000-0x000000000070D000-memory.dmp

                                                                                                                Filesize

                                                                                                                432KB

                                                                                                              • memory/3900-0-0x00000000006A0000-0x0000000000B45000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3900-17-0x00000000006A0000-0x0000000000B45000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3900-4-0x00000000006A0000-0x0000000000B45000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3900-3-0x00000000006A0000-0x0000000000B45000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3900-2-0x00000000006A1000-0x000000000070D000-memory.dmp

                                                                                                                Filesize

                                                                                                                432KB

                                                                                                              • memory/3900-1-0x0000000077964000-0x0000000077966000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/4064-110-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                Filesize

                                                                                                                400KB

                                                                                                              • memory/4064-111-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                                Filesize

                                                                                                                400KB

                                                                                                              • memory/4128-41-0x0000000000811000-0x000000000087D000-memory.dmp

                                                                                                                Filesize

                                                                                                                432KB

                                                                                                              • memory/4128-155-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-16-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-19-0x0000000000811000-0x000000000087D000-memory.dmp

                                                                                                                Filesize

                                                                                                                432KB

                                                                                                              • memory/4128-20-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-21-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-36-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-38-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-42-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-43-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-64-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-109-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4128-761-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4676-863-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-864-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-858-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-866-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-870-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-855-0x0000000140000000-0x000000014043E000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.2MB

                                                                                                              • memory/4676-857-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-859-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-865-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-861-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-868-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-869-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-867-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-862-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/4676-860-0x0000000000750000-0x00000000008D8000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.5MB

                                                                                                              • memory/5020-747-0x0000000000400000-0x0000000000685000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.5MB

                                                                                                              • memory/5312-132-0x0000000002A10000-0x0000000002A7B000-memory.dmp

                                                                                                                Filesize

                                                                                                                428KB

                                                                                                              • memory/7288-34314-0x0000000000080000-0x0000000000528000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/7288-34308-0x0000000000080000-0x0000000000528000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/10288-34532-0x0000000000810000-0x0000000000CB5000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/13168-34255-0x00000000002D0000-0x0000000000BA8000-memory.dmp

                                                                                                                Filesize

                                                                                                                8.8MB

                                                                                                              • memory/13168-34259-0x0000000005580000-0x000000000558A000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/13168-34258-0x0000000005690000-0x000000000572C000-memory.dmp

                                                                                                                Filesize

                                                                                                                624KB

                                                                                                              • memory/13168-34311-0x0000000008FF0000-0x00000000092B2000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.8MB

                                                                                                              • memory/13168-34995-0x0000000001080000-0x000000000109A000-memory.dmp

                                                                                                                Filesize

                                                                                                                104KB

                                                                                                              • memory/13168-34996-0x0000000001200000-0x0000000001206000-memory.dmp

                                                                                                                Filesize

                                                                                                                24KB

                                                                                                              • memory/13168-34256-0x0000000005B00000-0x00000000060A4000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.6MB

                                                                                                              • memory/13168-34257-0x00000000055F0000-0x0000000005682000-memory.dmp

                                                                                                                Filesize

                                                                                                                584KB

                                                                                                              • memory/13168-34312-0x0000000002F30000-0x0000000002F36000-memory.dmp

                                                                                                                Filesize

                                                                                                                24KB