Resubmissions

22-08-2024 17:47

240822-wcvjwszbrd 10

22-08-2024 17:43

240822-wa339asbnn 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    22-08-2024 17:47

General

  • Target

    SyncSpoofer.exe

  • Size

    276KB

  • MD5

    5a8afe7bfd11728c32066c4290eeddc7

  • SHA1

    f2064bbdec287d61722ef35e511b4090212cd1a8

  • SHA256

    92c799a2fd29060a44558a153d1ff5866e420e46b35bdd4546c782c17d4bb50f

  • SHA512

    e03994e666aa7ff84400e86e4cc3db5a77a5475e1961b553f16dbc293160f58f196b0ab6fb7be4ba34b1d030969f2f94ae80dc0c423f3ec015621bf987b796cb

  • SSDEEP

    1536:hJ99JW77A9oXFY+w67Vh7O9H/squacb3P12NETDLiaSKry3bgDBsvVeXBdZs4o7M:vSFHh69HEZJRTDLiaSKreumVeBs4o

Malware Config

Signatures

  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 1 IoCs
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 43 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 30 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 64 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 23 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3864
    • C:\Users\Admin\AppData\Roaming\sWsmPty.exe
      "C:\Users\Admin\AppData\Roaming\sWsmPty.exe"
      2⤵
      • Executes dropped EXE
      PID:1176
    • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe
      "C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5560
    • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
      "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:6024
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: DBVV-GH75
        3⤵
          PID:5904
          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
            C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: DBVV-GH75
            4⤵
            • Executes dropped EXE
            PID:2780
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
          3⤵
            PID:3004
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:412
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5016
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5436
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5404
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5360
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5540
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5656
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5672
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5740
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5764
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:1228
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5200
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              PID:5912
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              PID:5396
            • C:\ProgramData\Microsoft\Windows\DevManView.exe
              C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Maps connected drives based on registry
              • Checks SCSI registry key(s)
              PID:5356
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
            3⤵
              PID:3732
              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 13765HP-TRGT7992AB
                4⤵
                • Executes dropped EXE
                PID:3260
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
              3⤵
                PID:4792
                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 213765HP-TRGT7992RV
                  4⤵
                  • Executes dropped EXE
                  PID:5256
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                3⤵
                  PID:5400
                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 813765HP-TRGT7992SG
                    4⤵
                    • Executes dropped EXE
                    PID:5756
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                  3⤵
                    PID:5476
                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                      4⤵
                      • Executes dropped EXE
                      PID:3304
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                    3⤵
                      PID:6100
                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 513765HP-TRGT7992SL
                        4⤵
                        • Executes dropped EXE
                        PID:5540
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                      3⤵
                        PID:5672
                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 413765HP-TRGT7992FA
                          4⤵
                          • Executes dropped EXE
                          PID:5764
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                        3⤵
                          PID:5012
                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 613765HP-TRGT7992FU
                            4⤵
                            • Executes dropped EXE
                            PID:5372
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                          3⤵
                            PID:4988
                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 313765HP-TRGT7992DQ
                              4⤵
                              • Executes dropped EXE
                              PID:1980
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                            3⤵
                              PID:412
                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 713769HP-TRGT18741MST
                                4⤵
                                • Executes dropped EXE
                                PID:5404
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                              3⤵
                                PID:5740
                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                  4⤵
                                  • Executes dropped EXE
                                  PID:5016
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                3⤵
                                  PID:4396
                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 13785HP-TRGT6947AB
                                    4⤵
                                    • Executes dropped EXE
                                    PID:3680
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                  3⤵
                                    PID:5484
                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 213785HP-TRGT6947RV
                                      4⤵
                                      • Executes dropped EXE
                                      PID:5016
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                    3⤵
                                      PID:5372
                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 813785HP-TRGT6947SG
                                        4⤵
                                        • Executes dropped EXE
                                        PID:3336
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                      3⤵
                                        PID:5360
                                        • C:\Windows\System32\Conhost.exe
                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          4⤵
                                            PID:4988
                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                            4⤵
                                            • Executes dropped EXE
                                            PID:4344
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                          3⤵
                                            PID:4436
                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 513785HP-TRGT6947SL
                                              4⤵
                                              • Executes dropped EXE
                                              PID:5204
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                            3⤵
                                              PID:4768
                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 413785HP-TRGT6947FA
                                                4⤵
                                                • Executes dropped EXE
                                                PID:2780
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                              3⤵
                                                PID:3004
                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 613785HP-TRGT6947FU
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:4764
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                3⤵
                                                  PID:5748
                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 313785HP-TRGT6947DQ
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:2588
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                  3⤵
                                                    PID:3260
                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 713785HP-TRGT6947MST
                                                      4⤵
                                                      • Executes dropped EXE
                                                      PID:4396
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                    3⤵
                                                      PID:3544
                                                      • C:\Windows\System32\Conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        4⤵
                                                          PID:5012
                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                          4⤵
                                                          • Executes dropped EXE
                                                          PID:2288
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                        3⤵
                                                          PID:5284
                                                          • C:\Windows\System32\Conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            4⤵
                                                              PID:4436
                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 13801HP-TRGT27921AB
                                                              4⤵
                                                              • Executes dropped EXE
                                                              PID:5672
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                            3⤵
                                                              PID:2096
                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 213801HP-TRGT27921RV
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:4276
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                              3⤵
                                                                PID:5268
                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 813801HP-TRGT27921SG
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  PID:5740
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                3⤵
                                                                  PID:3680
                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    PID:5464
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                              1⤵
                                                              • Enumerates system info in registry
                                                              • Modifies data under HKEY_USERS
                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:4236
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffcf741cc40,0x7ffcf741cc4c,0x7ffcf741cc58
                                                                2⤵
                                                                  PID:3292
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1884 /prefetch:2
                                                                  2⤵
                                                                    PID:4064
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:3
                                                                    2⤵
                                                                      PID:1512
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2436 /prefetch:8
                                                                      2⤵
                                                                        PID:4572
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3200 /prefetch:1
                                                                        2⤵
                                                                          PID:2732
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3324 /prefetch:1
                                                                          2⤵
                                                                            PID:3052
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4632,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:1
                                                                            2⤵
                                                                              PID:4816
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4652,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:8
                                                                              2⤵
                                                                                PID:4336
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4868 /prefetch:8
                                                                                2⤵
                                                                                  PID:3556
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4472,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5204 /prefetch:1
                                                                                  2⤵
                                                                                    PID:1416
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5348,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5384 /prefetch:1
                                                                                    2⤵
                                                                                      PID:4732
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5212,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5504 /prefetch:1
                                                                                      2⤵
                                                                                        PID:2696
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3460,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3340 /prefetch:1
                                                                                        2⤵
                                                                                          PID:3016
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3464,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3420 /prefetch:1
                                                                                          2⤵
                                                                                            PID:1448
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3296,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5780 /prefetch:1
                                                                                            2⤵
                                                                                              PID:1228
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4668,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5228 /prefetch:1
                                                                                              2⤵
                                                                                                PID:5028
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5580,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5504 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:876
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4508,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3248 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:2036
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4084,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3244 /prefetch:1
                                                                                                    2⤵
                                                                                                      PID:868
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5648,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5960 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:3408
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5620,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6084 /prefetch:1
                                                                                                        2⤵
                                                                                                          PID:1892
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5688,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6108 /prefetch:1
                                                                                                          2⤵
                                                                                                            PID:2460
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5136,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5192 /prefetch:1
                                                                                                            2⤵
                                                                                                              PID:380
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5172,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5544 /prefetch:1
                                                                                                              2⤵
                                                                                                                PID:5524
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=1244,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3232 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:5532
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6404,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6420 /prefetch:1
                                                                                                                  2⤵
                                                                                                                    PID:5660
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6444,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6564 /prefetch:1
                                                                                                                    2⤵
                                                                                                                      PID:5688
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6740,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6724 /prefetch:1
                                                                                                                      2⤵
                                                                                                                        PID:5788
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6952,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6976 /prefetch:1
                                                                                                                        2⤵
                                                                                                                          PID:4916
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=7104,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6984 /prefetch:1
                                                                                                                          2⤵
                                                                                                                            PID:4908
                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=7228,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7240 /prefetch:1
                                                                                                                            2⤵
                                                                                                                              PID:5200
                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=7360,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7372 /prefetch:1
                                                                                                                              2⤵
                                                                                                                                PID:5208
                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=7568,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7584 /prefetch:1
                                                                                                                                2⤵
                                                                                                                                  PID:1904
                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6744,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8276 /prefetch:1
                                                                                                                                  2⤵
                                                                                                                                    PID:6036
                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=7048,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7272 /prefetch:1
                                                                                                                                    2⤵
                                                                                                                                      PID:1644
                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=7276,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7144 /prefetch:1
                                                                                                                                      2⤵
                                                                                                                                        PID:1676
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=7032,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7172 /prefetch:1
                                                                                                                                        2⤵
                                                                                                                                          PID:1392
                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=7008,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7260 /prefetch:1
                                                                                                                                          2⤵
                                                                                                                                            PID:3064
                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=7348,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7320 /prefetch:1
                                                                                                                                            2⤵
                                                                                                                                              PID:2404
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=6764,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8640 /prefetch:1
                                                                                                                                              2⤵
                                                                                                                                                PID:3732
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=6792,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7080 /prefetch:1
                                                                                                                                                2⤵
                                                                                                                                                  PID:5356
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=6804,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7716 /prefetch:1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2272
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=8548,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8160 /prefetch:1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:6092
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=8440,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8808 /prefetch:1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:5404
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=8432,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7140 /prefetch:1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:5624
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=7020,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8868 /prefetch:1
                                                                                                                                                          2⤵
                                                                                                                                                            PID:404
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=8308,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8856 /prefetch:1
                                                                                                                                                            2⤵
                                                                                                                                                              PID:3336
                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=9032,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8320 /prefetch:1
                                                                                                                                                              2⤵
                                                                                                                                                                PID:4880
                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=8328,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6864 /prefetch:1
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:428
                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=7960,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=9052 /prefetch:1
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:3940
                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=8172,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7496 /prefetch:1
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:5676
                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=8032,i,17736336835900951744,4428239969607966491,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6800 /prefetch:8
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                      PID:700
                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4052
                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:1536

                                                                                                                                                                      Network

                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                      Replay Monitor

                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                      Downloads

                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        452KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                                                        SHA1

                                                                                                                                                                        7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                                                        SHA256

                                                                                                                                                                        66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                                                        SHA512

                                                                                                                                                                        2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                                                        SHA1

                                                                                                                                                                        48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                                                        SHA256

                                                                                                                                                                        fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                                                        SHA512

                                                                                                                                                                        cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        162KB

                                                                                                                                                                        MD5

                                                                                                                                                                        33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                                                        SHA1

                                                                                                                                                                        1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                                                        SHA256

                                                                                                                                                                        a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                                                        SHA512

                                                                                                                                                                        c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                                                        SHA1

                                                                                                                                                                        7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                                                        SHA256

                                                                                                                                                                        7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                                                        SHA512

                                                                                                                                                                        7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        165KB

                                                                                                                                                                        MD5

                                                                                                                                                                        81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                                        SHA1

                                                                                                                                                                        0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                                        SHA256

                                                                                                                                                                        fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                                        SHA512

                                                                                                                                                                        675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                                                        Filesize

                                                                                                                                                                        18KB

                                                                                                                                                                        MD5

                                                                                                                                                                        785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                                                        SHA1

                                                                                                                                                                        029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                                                        SHA256

                                                                                                                                                                        37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                                                        SHA512

                                                                                                                                                                        40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4ded78b9-32fe-48be-a127-990e294d6542.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        d76785f05cc271a35c4762e9f458a16f

                                                                                                                                                                        SHA1

                                                                                                                                                                        5af38749b680f979d22539ddc5a19fc1b6890fbd

                                                                                                                                                                        SHA256

                                                                                                                                                                        02971e6930b8fcbbcc72c346af63e8f8442d7a7baf324753d9e0748722a17b38

                                                                                                                                                                        SHA512

                                                                                                                                                                        9e41894eef99d1f0ee93ff2a4bb0c1b9c11d3df630e7cd78c57f3f02fb631e89b61ef49cc1c3bb784c9544c860149157bc6c9bdf4ed7f21c02e5389af2cb93bf

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                        Filesize

                                                                                                                                                                        649B

                                                                                                                                                                        MD5

                                                                                                                                                                        626e4bdf7187d7599895b01ae6d9e440

                                                                                                                                                                        SHA1

                                                                                                                                                                        ac7217d4ee991816c1beb25ef42344d49eb0ed48

                                                                                                                                                                        SHA256

                                                                                                                                                                        539da599b7a30e0dcaed5540b1c38909dc70957e91c188672d958db2597c9e20

                                                                                                                                                                        SHA512

                                                                                                                                                                        6152ad88899a3e15a01e5ca626750770eb07202a81e50b528cbaf0b3cc4d6fea6ffe39509aed88949105cdfb3016d08f543119a7d81efef5241cdf4e1145ce0b

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                                                                                                                                        Filesize

                                                                                                                                                                        18KB

                                                                                                                                                                        MD5

                                                                                                                                                                        4fd8b59de6a786eb2556342479d0d4f8

                                                                                                                                                                        SHA1

                                                                                                                                                                        72b41293088cc50ef196b2f1441d8f18276f54ac

                                                                                                                                                                        SHA256

                                                                                                                                                                        45cf7dd2b2d864a1c18d92752427a5d89bcde133f74da10576e106de5330090b

                                                                                                                                                                        SHA512

                                                                                                                                                                        5c6ca04b5e29bc4744712a97d1694f7134a266d50a22af0fea1011e1ebf8bf7a90d2d0156678eb3305546fa4be85f2c364a8e72bc0ca626d37d51c161e90044d

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001b

                                                                                                                                                                        Filesize

                                                                                                                                                                        27KB

                                                                                                                                                                        MD5

                                                                                                                                                                        4efb9aa5385421fc5899f9e7abf7e8cb

                                                                                                                                                                        SHA1

                                                                                                                                                                        2572cbd83a21ce01f315c126505f20f5e52da704

                                                                                                                                                                        SHA256

                                                                                                                                                                        1f9c006e426f89d13e2ad5550f1eb29e85fa4595b31086be29cd9adb3cbdc960

                                                                                                                                                                        SHA512

                                                                                                                                                                        e4ac6b0b72ffaab0dac276a764e6bfd7c78cb07024adfedaf0542a88515ca57bbcaa6c679dcf0f221f2da4840f25aedc08cb0a68146e181cf776b959b5463d07

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001e

                                                                                                                                                                        Filesize

                                                                                                                                                                        16KB

                                                                                                                                                                        MD5

                                                                                                                                                                        9c6b5ce6b3452e98573e6409c34dd73c

                                                                                                                                                                        SHA1

                                                                                                                                                                        de607fadef62e36945a409a838eb8fc36d819b42

                                                                                                                                                                        SHA256

                                                                                                                                                                        cd729039a1b314b25ea94b5c45c8d575d3387f7df83f98c233614bf09484a1fc

                                                                                                                                                                        SHA512

                                                                                                                                                                        4cfd6cc6e7af1e1c300a363a9be2c973d1797d2cd9b9009d9e1389b418dde76f5f976a6b4c2bf7ad075d784b5459f46420677370d72a0aaacd0bd477b251b8d7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000026

                                                                                                                                                                        Filesize

                                                                                                                                                                        63KB

                                                                                                                                                                        MD5

                                                                                                                                                                        e4cc1ece2f2425b10ae2ccc212c1dafc

                                                                                                                                                                        SHA1

                                                                                                                                                                        92609e6d0093693110baa23758382889bcb30da6

                                                                                                                                                                        SHA256

                                                                                                                                                                        92e9415d8bc8529e2a3f335258ef7ff159cce2965ce3b2b7c15f73720efee809

                                                                                                                                                                        SHA512

                                                                                                                                                                        2848dee3a6da891b7044518bc97aeafd340705cebe846350b9a7f314b52450f1eb977b8b492638965ce4674ebaa341e4f832438199c3cad2fb0a0793ef83a619

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\d9a31366e58bf3e2_0

                                                                                                                                                                        Filesize

                                                                                                                                                                        247B

                                                                                                                                                                        MD5

                                                                                                                                                                        5ff607954f13d77c823835b2e6dbba01

                                                                                                                                                                        SHA1

                                                                                                                                                                        0740b2747b470c3a05e3eaab6b374fc241b42464

                                                                                                                                                                        SHA256

                                                                                                                                                                        dbed764c1fe8e51a2d62564305948786b5bed00bb92062f11e79ed3d96053c18

                                                                                                                                                                        SHA512

                                                                                                                                                                        aa5d7981385604b779ed9b4dcc4b525df5c9239385204c822870b7c996fc09dab3e4fdfe2e52d52ca5ff64c5e397e55508bab144398a9b86c9448bfeec79b407

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                        Filesize

                                                                                                                                                                        3KB

                                                                                                                                                                        MD5

                                                                                                                                                                        7c1d535f1c549678888bc48b595e7cd0

                                                                                                                                                                        SHA1

                                                                                                                                                                        6b7da20aa8341d6c42b2c069189b0b17c6134583

                                                                                                                                                                        SHA256

                                                                                                                                                                        8da18e82c88e2afdceda83c1335846a5c2a5e3eec7e96e2e24659b09ae624119

                                                                                                                                                                        SHA512

                                                                                                                                                                        6f1ef9e3456982584ce6fa59d0f4bcccbe7bae445007ade8ac626f3560125a1f6c349b8033455ebf0ee0615662c03f869fb717addf272a5b0086f09fafafe961

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                        Filesize

                                                                                                                                                                        3KB

                                                                                                                                                                        MD5

                                                                                                                                                                        2401e73d4a06f7bb4206f721da2e8bec

                                                                                                                                                                        SHA1

                                                                                                                                                                        f2f5e3e1b6c683c126dfa79927786bd8ef45d0b0

                                                                                                                                                                        SHA256

                                                                                                                                                                        c481525758a1aa4929b58c9f4aa3d3ab22b7a644dfc07b985739632a339328ec

                                                                                                                                                                        SHA512

                                                                                                                                                                        b0751fa826b4bf098e2753d615841142bc147634181f8b8e8f0c17397ec61e79f99ffd37a6aff2ba223fc0f6fd1f9d12332aa1389313fadca71e38f6b0c50950

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                        Filesize

                                                                                                                                                                        3KB

                                                                                                                                                                        MD5

                                                                                                                                                                        d36f3afd3ceb06a4cf5bddffa993900f

                                                                                                                                                                        SHA1

                                                                                                                                                                        5e7bdbe935c2614d97065b89a096d5b2a838d23f

                                                                                                                                                                        SHA256

                                                                                                                                                                        735cba92df1558b13caba724a3132366a9ce08d19fd324bdf287ef06233c5367

                                                                                                                                                                        SHA512

                                                                                                                                                                        26267c3945fa8a82bd069cbd9b525e44839dfc6c248a3eff4aa7e32b7b35f6ed0392938465273b0034e89b0fe09ea3bc3ec834aa685aefe0a44af43f30eb4d5b

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                        Filesize

                                                                                                                                                                        20KB

                                                                                                                                                                        MD5

                                                                                                                                                                        9666354f12edf9fa8ae67b15e7da15c8

                                                                                                                                                                        SHA1

                                                                                                                                                                        a47ac99fd792c191d51ca9dea8c61806dd453f2d

                                                                                                                                                                        SHA256

                                                                                                                                                                        c88013b3cbebca5f783c5e024e8ac2c4cd61e8f9d31f04ce342853c2ff23a8ec

                                                                                                                                                                        SHA512

                                                                                                                                                                        50c89141aa80c767a32ac73e1c11cc27d92cbe30c4c2afd275958316e8c37970e311ba6bc80a8c3a6100a6cf6280ff8bf692c5f353d03062c424b08995b2f880

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                        Filesize

                                                                                                                                                                        23KB

                                                                                                                                                                        MD5

                                                                                                                                                                        7b484fb3ab5bca8bce89c10cfd1115c7

                                                                                                                                                                        SHA1

                                                                                                                                                                        b4a34ab527a0cc82c1ac339c259faabec7ab13da

                                                                                                                                                                        SHA256

                                                                                                                                                                        18245ac4a113bebfcceba4e354c61de69a1e151c5ee5d3d7cff2e0528d2e7f05

                                                                                                                                                                        SHA512

                                                                                                                                                                        723775ba6676af7687b1a276c65dbe4bb30bf19922cc460ffa750b5904f96de1dd4e9ea10917fac8190cc8810b0a6cd7cc7140080c0667e44f040869baa7d32f

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                        Filesize

                                                                                                                                                                        2B

                                                                                                                                                                        MD5

                                                                                                                                                                        d751713988987e9331980363e24189ce

                                                                                                                                                                        SHA1

                                                                                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                        SHA256

                                                                                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                        SHA512

                                                                                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                        MD5

                                                                                                                                                                        d8d2e2889848f3d6cb13f1cc28685dc4

                                                                                                                                                                        SHA1

                                                                                                                                                                        c05375a5473ee61903ce9c2ad860ecf269e8c937

                                                                                                                                                                        SHA256

                                                                                                                                                                        66524258b025a318421dd1439b85e1bace751318d1567716ae934f1313eda0e9

                                                                                                                                                                        SHA512

                                                                                                                                                                        7ee2cefd644a33c10ac32c5b30b773bfe53db7be56f5c9e8c26b1ca85aa1c0d0632b7eeae60253a67b14f329c58206a435b3ebe9eaed3806edb8f0b01ed50cc7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        356B

                                                                                                                                                                        MD5

                                                                                                                                                                        1c6b2526f169c61417108418dde3780e

                                                                                                                                                                        SHA1

                                                                                                                                                                        9c0c9e3e4018d4c3702e56526488e564608386dc

                                                                                                                                                                        SHA256

                                                                                                                                                                        087ce29740388a7f490b3d79b71b9d80a71640077ef0a67c18c4b89859b94ace

                                                                                                                                                                        SHA512

                                                                                                                                                                        349ee226e98578b27b22a7ce2ccfde1c6b63b18b21405c012b15681b21c9d423bda17c2a41f13c021b949dc436cf3b0673e84fb2f80dcf90a031e7468b391502

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        2KB

                                                                                                                                                                        MD5

                                                                                                                                                                        17fd6f7b69c66e49a8f28e94dcec4547

                                                                                                                                                                        SHA1

                                                                                                                                                                        e98689630ff3330c10f5c420611f70bb36c902ff

                                                                                                                                                                        SHA256

                                                                                                                                                                        bab4542839c230fa9c1de285980a87ebb3ead07c1ab4a31b0578c656ddcfc7d0

                                                                                                                                                                        SHA512

                                                                                                                                                                        439398cc2b08748f491f71079e3882eb3d49a82d0e1f3924544c0d6e65f02ae229c4f1ffc5e01b77244ad428f57ff370960eb895ecf662f98ece40cf5503412d

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                        MD5

                                                                                                                                                                        ff0df08c36b3f6c59d7f06fd36ce0dca

                                                                                                                                                                        SHA1

                                                                                                                                                                        56caa9b326fd9e2b99709a86b96a0c6c78b3b517

                                                                                                                                                                        SHA256

                                                                                                                                                                        bc54690dae910538bafd9b0c30d99555b67a9b33eabd9cb8309d859d1a265111

                                                                                                                                                                        SHA512

                                                                                                                                                                        58406c2cf757b9ac3d90ccdd7c97e84cba2a14079c00bd14adcae962dc388e8fff1f1d4bfb27a5fdf30d71a54b676ec91b9627e76d116bec228f71ef10cbc370

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                        MD5

                                                                                                                                                                        e605a52086a698d36d130dc0cea45a52

                                                                                                                                                                        SHA1

                                                                                                                                                                        d3041ba2d5affc8a1251a917948bbf1458f6c953

                                                                                                                                                                        SHA256

                                                                                                                                                                        f6c59d94f239a796e6dce05cb26ce90029bd02420303e5a7a36cf36c417fe9d6

                                                                                                                                                                        SHA512

                                                                                                                                                                        e51d46aef41d7dffc17767de8ebce980b2ca129b850e5226e2c8a7e41e9c08a6e489cb4aa89cdd2ce863e66d84502b389c198331f585853bcf6343e0d1398919

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                        MD5

                                                                                                                                                                        8c69904ae2dde764547985a1e1bb99d2

                                                                                                                                                                        SHA1

                                                                                                                                                                        2c1b2f81bfc5b7814355335758910fba3f301e82

                                                                                                                                                                        SHA256

                                                                                                                                                                        015aa65c1fef1a452bc91cdb84f298c4c7b6aea21ad92992c93fd4be4a3b02d0

                                                                                                                                                                        SHA512

                                                                                                                                                                        dacfeca04dd1ed35123d68d4c2f67f9f2aa2f622e25b5b27a88c967ad591f304307a109a88550eeb3f70b045b5a1925f535be457b206820c445cfc0d9ddd07c6

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                        MD5

                                                                                                                                                                        edd5ccb4d2f2fc372c5bda4042bf34ad

                                                                                                                                                                        SHA1

                                                                                                                                                                        ee66a02299819d5e94d65163a1e0359df89c1dd7

                                                                                                                                                                        SHA256

                                                                                                                                                                        d5acd0fe584671c6f76847bbf3f9e1edc7120542dbb9498e55f184e36856a6ef

                                                                                                                                                                        SHA512

                                                                                                                                                                        8f1465ddc2d7fe1db6b605eac7f1a6f879dbe4fc49045cd212ed074bfb7aa3f7c643dea2526b5a906161ace0f1a43ec36f462262f67f52c24bc81fbdb5ac3c7a

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        100357f52fe366af1c78008bab8ac626

                                                                                                                                                                        SHA1

                                                                                                                                                                        daaadd9aad542723664424b335786eddb617a8eb

                                                                                                                                                                        SHA256

                                                                                                                                                                        e02ead6d15e5e1fbf1a1fa7faed7dc4cca9b1be61e512afc6ee1770d94bebbac

                                                                                                                                                                        SHA512

                                                                                                                                                                        75d29335fc1020e52776615a18e269917e661ce3b277fb0e9bca24c43683fc161e83e6603d7fd50d2222514a616f024fbbe24275191bf25aa34e8bc5fc72b3d6

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b0c5e65066926ca81fc2079df1558b98

                                                                                                                                                                        SHA1

                                                                                                                                                                        1fe225c9887dced959b97a902411d686d19dd3ba

                                                                                                                                                                        SHA256

                                                                                                                                                                        4cb495416b6d9d28fc1a5eb481dd4b989826b65a11ff7c9200a60c1539b944dd

                                                                                                                                                                        SHA512

                                                                                                                                                                        d5ef4adafdfee0e76a46349cfa0d6aa71c71c9f997d95caa243a7b7782c9ba435e5065a247a5eb87d203a315637d6fc57ee6aa92a771d07eeae9f5d2fa9210e5

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        4296839ff5346f9ecc10e9921625cf62

                                                                                                                                                                        SHA1

                                                                                                                                                                        5fbbb8d964d4a224085625de7d9bf54360d68533

                                                                                                                                                                        SHA256

                                                                                                                                                                        d612eebae6dc25d1437fbb56df3f6f27294ddcbf43b22e9d4cb68f5ee3b4d08d

                                                                                                                                                                        SHA512

                                                                                                                                                                        b912789c850c427eae9e3cf44cca060195b699631003c3b8f9e22c02bea705a9b99ff8670f0934678ee7554de6fae3a1a20b457510052da9737c255c71e3bfa2

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        3c74053b4a26c86aa954a7dd4a09acce

                                                                                                                                                                        SHA1

                                                                                                                                                                        9b51d9d182b094c830b52679bfb7a14262ed0c10

                                                                                                                                                                        SHA256

                                                                                                                                                                        b87024b524fca760e65aca07b599610dfd2c80db9ec5a2b87c74058928c2b85d

                                                                                                                                                                        SHA512

                                                                                                                                                                        f4e9d7b3c150dad1202aa54f776018a1de3171127e293e17c6ce5732e961f65cb1d6970f9d607860e68e084ee28bca2977a3202e2fe477846d5956d0f617ec83

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b248f24c1e7eb06e4aa017e69d0ebb76

                                                                                                                                                                        SHA1

                                                                                                                                                                        6fd63999262fc141dbed5e75e4f999e3898230aa

                                                                                                                                                                        SHA256

                                                                                                                                                                        e65298b9240f2a47b073b90956f9446d5466fffef861f4c7bc027c10fc4072b3

                                                                                                                                                                        SHA512

                                                                                                                                                                        785628ae61e67282c9252347e820571bd407f890cd6908d1b37f33e6706ea2194a13ea16e375d21f38d93ea7d60393b5ed2dc00bbf7a2b4efbfaa420b1c1336c

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        0f1c09b13ba455e562779a9df7a1b238

                                                                                                                                                                        SHA1

                                                                                                                                                                        1f7c77ae8caacaf5a6feab48265f650082dbe80e

                                                                                                                                                                        SHA256

                                                                                                                                                                        1f522a50c78cf340fe972f7cb8c025a9b4836490e54473069d84aa390ac011a5

                                                                                                                                                                        SHA512

                                                                                                                                                                        ffcc94d5366f8d2d7562c38fa6375cd859c3fadc0f26cd080463e506200baf5eed1a239bb8b3e32fb6065d3f365d7a1ded3a2d87bf729610df3c877cec660722

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        012f6676bb45c30064b9297e4f1d71e6

                                                                                                                                                                        SHA1

                                                                                                                                                                        34edf38ae4c6cb670feabc7d5b7eeba89d27df4d

                                                                                                                                                                        SHA256

                                                                                                                                                                        5488d36bcf83202cc1f56b4a8e2a558270ca101ddc1205ab1a27e1154c3457e5

                                                                                                                                                                        SHA512

                                                                                                                                                                        02d661567b8ee4de0389a57777ccd1c2d0ef4a4255ac5a24a042e6ced5204eb11513a0e994178915fb77a1dd30f36097b3e3410283581bd5cdeea6bb31754588

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        95d8d9002eeadc243a401e7582d0a6a0

                                                                                                                                                                        SHA1

                                                                                                                                                                        70ba5095c4489f07a92841813648f81453896e70

                                                                                                                                                                        SHA256

                                                                                                                                                                        595d1d523bd2d5708661696d97d3f3683e47ffe21f0b0789615ff11680daf958

                                                                                                                                                                        SHA512

                                                                                                                                                                        ce91024d6cc0e2f705fe58343a60991e4617bb1102f1373a93b92e130151af80de99fbb294e03222c9b167422178ab2d2f6f1c911215403b58397b3c3363f754

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\MANIFEST-000001

                                                                                                                                                                        Filesize

                                                                                                                                                                        23B

                                                                                                                                                                        MD5

                                                                                                                                                                        3fd11ff447c1ee23538dc4d9724427a3

                                                                                                                                                                        SHA1

                                                                                                                                                                        1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                                                                                                                                        SHA256

                                                                                                                                                                        720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                                                                                                                                        SHA512

                                                                                                                                                                        10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\IndexedDB\indexeddb.leveldb\CURRENT

                                                                                                                                                                        Filesize

                                                                                                                                                                        16B

                                                                                                                                                                        MD5

                                                                                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                                                                                        SHA1

                                                                                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                        SHA256

                                                                                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                        SHA512

                                                                                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                        Filesize

                                                                                                                                                                        201KB

                                                                                                                                                                        MD5

                                                                                                                                                                        8a57e5e78e2c064f977017955e1a01bb

                                                                                                                                                                        SHA1

                                                                                                                                                                        b706b57b2a71925f85a768e9904fa55d8ebc3180

                                                                                                                                                                        SHA256

                                                                                                                                                                        17eaab0327232eca83d70a25c789bb335d196a0e97e916f699b866d4a3d8f403

                                                                                                                                                                        SHA512

                                                                                                                                                                        f3d90a11fd803b093e97623c64c84287fb77a06c2f62899892d80ae804da720354f4b4c5ea635cc410c5865b55869e35a7f64613777a570bd72e8d3de2340952

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        905KB

                                                                                                                                                                        MD5

                                                                                                                                                                        dd1313842898ffaf72d79df643637ded

                                                                                                                                                                        SHA1

                                                                                                                                                                        93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                                                        SHA256

                                                                                                                                                                        81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                                                        SHA512

                                                                                                                                                                        db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.6MB

                                                                                                                                                                        MD5

                                                                                                                                                                        dab13157795e19d8fe050f65ce49401d

                                                                                                                                                                        SHA1

                                                                                                                                                                        ecb6f0a864fd92fb7c423d882f9a6ea703096318

                                                                                                                                                                        SHA256

                                                                                                                                                                        d8b4ce77f87bfe0b958f01ea30f48cf53e6ff51b425a57abc4f83a71d47f58fc

                                                                                                                                                                        SHA512

                                                                                                                                                                        5cdb82bf347dbdae3c8e3f376ad18fb48509af3da91e8d18876ee7adb9db9fa9d2476060bf5de1294d44e86d477486db9efa045bd45a86a0e6739d6cfa9cca89

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sWsmPty.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        13.2MB

                                                                                                                                                                        MD5

                                                                                                                                                                        f94352e1545f9b8820885dca9baafcb4

                                                                                                                                                                        SHA1

                                                                                                                                                                        710f642efb3e30e5e9a3abc7586997de1aac0852

                                                                                                                                                                        SHA256

                                                                                                                                                                        07d614e26f1ab51b36eba12ba11e5deae3415688c6d6989e9a41d387884df763

                                                                                                                                                                        SHA512

                                                                                                                                                                        d13ccb3b6ba61db1bc1a03438fda50e617ea531ea568aa86366909fecee01b8979e284552aac2441aa8bdeddf4c1634d1d5e82701697978986294f53196537ab

                                                                                                                                                                      • memory/1176-401-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-391-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-658-0x0000000000400000-0x000000000114E000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        13.3MB

                                                                                                                                                                      • memory/1176-635-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-855-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-703-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-397-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-398-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-402-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-403-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-400-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-399-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-412-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/1176-756-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.4MB

                                                                                                                                                                      • memory/3864-3-0x0000000002B50000-0x0000000002B5C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        48KB

                                                                                                                                                                      • memory/3864-2-0x0000000074B30000-0x00000000752E0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        7.7MB

                                                                                                                                                                      • memory/3864-5-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                      • memory/3864-4-0x000000000C6A0000-0x000000000C6AA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        40KB

                                                                                                                                                                      • memory/3864-1-0x00000000006F0000-0x0000000000736000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        280KB

                                                                                                                                                                      • memory/3864-0-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4KB

                                                                                                                                                                      • memory/3864-507-0x0000000074B30000-0x00000000752E0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        7.7MB

                                                                                                                                                                      • memory/3864-353-0x0000000007AB0000-0x0000000008054000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        5.6MB

                                                                                                                                                                      • memory/3864-6-0x0000000074B30000-0x00000000752E0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        7.7MB

                                                                                                                                                                      • memory/5560-727-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-832-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-827-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-854-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-804-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-788-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-752-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-895-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-668-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-471-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                      • memory/5560-914-0x0000000000C40000-0x000000000169D000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB