Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 12:21

General

  • Target

    525aeed252d130d4771057a08e33c58bf81bee98098c7c2f4d3713c6e321df07.exe

  • Size

    6.0MB

  • MD5

    34edb006335c3040292d06750710d20a

  • SHA1

    7247650c0f544a3575adff86f2949d334d352c2e

  • SHA256

    525aeed252d130d4771057a08e33c58bf81bee98098c7c2f4d3713c6e321df07

  • SHA512

    8ddd5ae0bffaec38fddc00e2c93b7b86f4330ae8d781e59602d919e70cbb8bd7711616e414a2424f75019dda85908d47c182e09fcaa0834c91b9baecbc28c837

  • SSDEEP

    98304:M+3yDZ2B7AuQTcYV2ZyTgVrjTk+y7UkubEup165MQS34/Uhyxy4Y6zOLn7KZbZn3:MC+k7VQTayTgVrMdILY4481P7W

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

vidar

C2

https://t.me/asg7rd

https://steamcommunity.com/profiles/76561199794498376

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 9 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 16 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 16 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\525aeed252d130d4771057a08e33c58bf81bee98098c7c2f4d3713c6e321df07.exe
    "C:\Users\Admin\AppData\Local\Temp\525aeed252d130d4771057a08e33c58bf81bee98098c7c2f4d3713c6e321df07.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P0C56.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P0C56.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A4Y48.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A4Y48.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u98q5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u98q5.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3532
            • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe
              "C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5300
              • C:\Windows\Temp\{7F2382E4-3DDE-4177-B234-9D32D789014B}\.cr\sxqnmytm.exe
                "C:\Windows\Temp\{7F2382E4-3DDE-4177-B234-9D32D789014B}\.cr\sxqnmytm.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe" -burn.filehandle.attached=672 -burn.filehandle.self=688
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:5244
                • C:\Windows\Temp\{8D9EDA9C-122F-4546-B1E2-3767E85D6677}\.ba\ActiveISO.exe
                  "C:\Windows\Temp\{8D9EDA9C-122F-4546-B1E2-3767E85D6677}\.ba\ActiveISO.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:6440
                  • C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
                    C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    PID:6540
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: MapViewOfSection
                      PID:6580
                      • C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                        C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                        11⤵
                        • Loads dropped DLL
                        PID:3496
            • C:\Users\Admin\AppData\Local\Temp\1004359001\DuncanAdvancement.exe
              "C:\Users\Admin\AppData\Local\Temp\1004359001\DuncanAdvancement.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:6040
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy Za Za.bat & Za.bat
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3584
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:432
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "wrsa opssvc"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:6112
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4372
                • C:\Windows\SysWOW64\findstr.exe
                  findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3348
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 385902
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1968
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "VECOVERAGEGATESOCCURRING" Scottish
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3156
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Dirt + ..\Contacts + ..\Syria + ..\Gross + ..\Ministry + ..\Infected + ..\Trout + ..\Reforms + ..\Highlighted + ..\Mas + ..\Rotary + ..\Preston + ..\Remove + ..\Clock + ..\Liquid + ..\Isa + ..\Cape d
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4812
                • C:\Users\Admin\AppData\Local\Temp\385902\But.pif
                  But.pif d
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:5988
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /create /tn "TradeSwan" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeOptimize Solutions\TradeSwan.js'" /sc onlogon /F /RL HIGHEST
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:5416
                  • C:\Users\Admin\AppData\Local\Temp\385902\But.pif
                    C:\Users\Admin\AppData\Local\Temp\385902\But.pif
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    PID:6412
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                      10⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5496
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc5b42cc40,0x7ffc5b42cc4c,0x7ffc5b42cc58
                        11⤵
                          PID:6380
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2044,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:2
                          11⤵
                            PID:6628
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2092 /prefetch:3
                            11⤵
                              PID:6640
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2320,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2336 /prefetch:8
                              11⤵
                                PID:6736
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:1
                                11⤵
                                • Uses browser remote debugging
                                PID:6568
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:1
                                11⤵
                                • Uses browser remote debugging
                                PID:7108
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4016,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:1
                                11⤵
                                • Uses browser remote debugging
                                PID:3556
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4716 /prefetch:8
                                11⤵
                                  PID:840
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:8
                                  11⤵
                                    PID:2680
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3756,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4804 /prefetch:8
                                    11⤵
                                      PID:4052
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4316 /prefetch:8
                                      11⤵
                                        PID:4636
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:8
                                        11⤵
                                          PID:4664
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5208 /prefetch:8
                                          11⤵
                                            PID:1196
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4772,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5356 /prefetch:8
                                            11⤵
                                              PID:6456
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5496,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5232 /prefetch:8
                                              11⤵
                                                PID:3088
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5196,i,1198273616347240954,13542439800494574643,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5412 /prefetch:2
                                                11⤵
                                                • Uses browser remote debugging
                                                PID:3904
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                              10⤵
                                              • Uses browser remote debugging
                                              • Enumerates system info in registry
                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                              PID:3672
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc5b4346f8,0x7ffc5b434708,0x7ffc5b434718
                                                11⤵
                                                • Checks processor information in registry
                                                • Enumerates system info in registry
                                                PID:5436
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
                                                11⤵
                                                  PID:6400
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                                                  11⤵
                                                    PID:6428
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8
                                                    11⤵
                                                      PID:1196
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                                      11⤵
                                                      • Uses browser remote debugging
                                                      PID:6132
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                                                      11⤵
                                                      • Uses browser remote debugging
                                                      PID:5128
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
                                                      11⤵
                                                        PID:6520
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                                                        11⤵
                                                          PID:6988
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2868 /prefetch:2
                                                          11⤵
                                                            PID:7144
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4052 /prefetch:2
                                                            11⤵
                                                              PID:7044
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4056 /prefetch:2
                                                              11⤵
                                                                PID:6848
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2148 /prefetch:2
                                                                11⤵
                                                                  PID:6820
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4724 /prefetch:2
                                                                  11⤵
                                                                    PID:6752
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17726065293189538793,10224395495027771038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3892 /prefetch:2
                                                                    11⤵
                                                                      PID:5668
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 6412 -s 2008
                                                                    10⤵
                                                                    • Program crash
                                                                    PID:4576
                                                              • C:\Windows\SysWOW64\choice.exe
                                                                choice /d y /t 15
                                                                8⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:928
                                                          • C:\Users\Admin\AppData\Local\Temp\1004360001\df749a5787.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1004360001\df749a5787.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1520
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 1572
                                                              7⤵
                                                              • Program crash
                                                              PID:6056
                                                          • C:\Users\Admin\AppData\Local\Temp\1004361001\7e5a3e77f8.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1004361001\7e5a3e77f8.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2980
                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                            6⤵
                                                              PID:5892
                                                            • C:\Users\Admin\AppData\Local\Temp\1004363001\912eff0b3f.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1004363001\912eff0b3f.exe"
                                                              6⤵
                                                              • Modifies Windows Defender Real-time Protection settings
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Windows security modification
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5368
                                                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c2181.exe
                                                          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c2181.exe
                                                          4⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2144
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 1568
                                                            5⤵
                                                            • Program crash
                                                            PID:4308
                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M04K.exe
                                                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M04K.exe
                                                        3⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Loads dropped DLL
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Checks processor information in registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2796
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                          4⤵
                                                          • Uses browser remote debugging
                                                          • Enumerates system info in registry
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:3900
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc5b6ecc40,0x7ffc5b6ecc4c,0x7ffc5b6ecc58
                                                            5⤵
                                                              PID:548
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2024,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:2
                                                              5⤵
                                                                PID:5040
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:3
                                                                5⤵
                                                                  PID:2644
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:8
                                                                  5⤵
                                                                    PID:3856
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:2264
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:1396
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:1552
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4268 /prefetch:8
                                                                    5⤵
                                                                      PID:1012
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3592,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:8
                                                                      5⤵
                                                                        PID:3384
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4684,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:8
                                                                        5⤵
                                                                          PID:3420
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3168,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:8
                                                                          5⤵
                                                                            PID:3836
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:8
                                                                            5⤵
                                                                              PID:400
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4532,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4500 /prefetch:8
                                                                              5⤵
                                                                                PID:688
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:8
                                                                                5⤵
                                                                                  PID:1316
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4648,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5172 /prefetch:8
                                                                                  5⤵
                                                                                    PID:4808
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5104,i,10177149375258421237,9300099435423616155,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5224 /prefetch:2
                                                                                    5⤵
                                                                                    • Uses browser remote debugging
                                                                                    PID:5576
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                                  4⤵
                                                                                  • Uses browser remote debugging
                                                                                  • Enumerates system info in registry
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  PID:5152
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc59bc46f8,0x7ffc59bc4708,0x7ffc59bc4718
                                                                                    5⤵
                                                                                    • Checks processor information in registry
                                                                                    • Enumerates system info in registry
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:5136
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:2
                                                                                    5⤵
                                                                                      PID:2940
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                                                                                      5⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:5348
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2552 /prefetch:2
                                                                                      5⤵
                                                                                        PID:5416
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 /prefetch:8
                                                                                        5⤵
                                                                                          PID:5424
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:2
                                                                                          5⤵
                                                                                            PID:3836
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:1
                                                                                            5⤵
                                                                                            • Uses browser remote debugging
                                                                                            PID:5544
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1
                                                                                            5⤵
                                                                                            • Uses browser remote debugging
                                                                                            PID:3224
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2880 /prefetch:2
                                                                                            5⤵
                                                                                              PID:5616
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2892 /prefetch:2
                                                                                              5⤵
                                                                                                PID:5772
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3464 /prefetch:2
                                                                                                5⤵
                                                                                                  PID:5800
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3464 /prefetch:2
                                                                                                  5⤵
                                                                                                    PID:5896
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4176 /prefetch:2
                                                                                                    5⤵
                                                                                                      PID:6012
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,9619142658799148335,5692885754371253994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3936 /prefetch:2
                                                                                                      5⤵
                                                                                                        PID:6020
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 2132
                                                                                                      4⤵
                                                                                                      • Program crash
                                                                                                      PID:4216
                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4q306I.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4q306I.exe
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                  PID:6016
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM firefox.exe /T
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2752
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM chrome.exe /T
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5232
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM msedge.exe /T
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2444
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM opera.exe /T
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5616
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM brave.exe /T
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5632
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                    3⤵
                                                                                                      PID:5884
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                        4⤵
                                                                                                        • Checks processor information in registry
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:6008
                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bc67ecd-140b-4591-ae98-521feb367872} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" gpu
                                                                                                          5⤵
                                                                                                            PID:4860
                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0668c40-2ea8-492a-bfb5-f01349f5f7bd} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" socket
                                                                                                            5⤵
                                                                                                              PID:2640
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3104 -prefMapHandle 3112 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dcfcc266-ef94-4cf0-8cb4-919825711603} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" tab
                                                                                                              5⤵
                                                                                                                PID:4776
                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2596 -childID 2 -isForBrowser -prefsHandle 4064 -prefMapHandle 4060 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b3db2d5-22bb-4284-a6f0-190c59d3711a} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" tab
                                                                                                                5⤵
                                                                                                                  PID:5732
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4852 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ffd95df-e19a-4aeb-817f-bc835e24fc7c} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" utility
                                                                                                                  5⤵
                                                                                                                  • Checks processor information in registry
                                                                                                                  PID:6892
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5320 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7fe09249-658d-4717-a98e-d7f768216185} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" tab
                                                                                                                  5⤵
                                                                                                                    PID:880
                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9209c08c-4ef9-4e1e-a0b6-e11f13640e79} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" tab
                                                                                                                    5⤵
                                                                                                                      PID:6000
                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -childID 5 -isForBrowser -prefsHandle 5708 -prefMapHandle 5712 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3db5400-cc57-4a49-9e79-49796bfd892f} 6008 "\\.\pipe\gecko-crash-server-pipe.6008" tab
                                                                                                                      5⤵
                                                                                                                        PID:5028
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2144 -ip 2144
                                                                                                                1⤵
                                                                                                                  PID:4428
                                                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                  1⤵
                                                                                                                    PID:4892
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                    1⤵
                                                                                                                      PID:4800
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1520 -ip 1520
                                                                                                                      1⤵
                                                                                                                        PID:5944
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2796 -ip 2796
                                                                                                                        1⤵
                                                                                                                          PID:4776
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1520 -ip 1520
                                                                                                                          1⤵
                                                                                                                            PID:1672
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                            1⤵
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            PID:2908
                                                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                            1⤵
                                                                                                                              PID:4416
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6412 -ip 6412
                                                                                                                              1⤵
                                                                                                                                PID:4900
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                                1⤵
                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                PID:4084

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\ProgramData\HCBGDGCAAKJE\IJECBG

                                                                                                                                Filesize

                                                                                                                                114KB

                                                                                                                                MD5

                                                                                                                                2dc3133caeb5792be5e5c6c2fa812e34

                                                                                                                                SHA1

                                                                                                                                0ed75d85c6a2848396d5dd30e89987f0a8b5cedb

                                                                                                                                SHA256

                                                                                                                                4b3998fd2844bc1674b691c74d67e56062e62bf4738de9fe7fb26b8d3def9cd7

                                                                                                                                SHA512

                                                                                                                                2ca157c2f01127115d0358607c167c2f073b83d185bdd44ac221b3792c531d784515a76344585ec1557de81430a7d2e69b286155986e46b1e720dfac96098612

                                                                                                                              • C:\ProgramData\chrome.dll

                                                                                                                                Filesize

                                                                                                                                676KB

                                                                                                                                MD5

                                                                                                                                eda18948a989176f4eebb175ce806255

                                                                                                                                SHA1

                                                                                                                                ff22a3d5f5fb705137f233c36622c79eab995897

                                                                                                                                SHA256

                                                                                                                                81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                                                                                                                                SHA512

                                                                                                                                160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                40B

                                                                                                                                MD5

                                                                                                                                6adcd808d1a2a6f9ebac5f805cd220cf

                                                                                                                                SHA1

                                                                                                                                0f0e1fea371ce8cbc6cf270c6863f9dcd546e4e5

                                                                                                                                SHA256

                                                                                                                                3bed64a9bfe94bc32d7519e6ab1132f4bba27029407c0d710aea073b92b4eb26

                                                                                                                                SHA512

                                                                                                                                bb11c7df6fcd3f7a66c3a5c9445084e386e0db6579c5d2b4480f6381e8f41b945279e4c9b2753c134834e5c25663ad6368b3af41ca9a018d7713fd184cafc48d

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                Filesize

                                                                                                                                649B

                                                                                                                                MD5

                                                                                                                                a901740213a1ae825e9c2ee57b916f22

                                                                                                                                SHA1

                                                                                                                                fabd113cbe5c99d600da8cb937e07b4183ef4da3

                                                                                                                                SHA256

                                                                                                                                987aa0434c9a9f310f772a914078b084a12fc7ec8e4ed9b406c0e3245dec4eba

                                                                                                                                SHA512

                                                                                                                                91a4ed1cd76508ce8121b6984f802e2acadd30c00f6762b99b3e5c9dc2e70ec431a8dce7b051ed3d7ab3525f65508c33d847e9a03ddcfd0571e05d86c0107313

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

                                                                                                                                Filesize

                                                                                                                                851B

                                                                                                                                MD5

                                                                                                                                07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                SHA1

                                                                                                                                6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                SHA256

                                                                                                                                6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                SHA512

                                                                                                                                7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

                                                                                                                                Filesize

                                                                                                                                854B

                                                                                                                                MD5

                                                                                                                                4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                SHA1

                                                                                                                                fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                SHA256

                                                                                                                                6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                SHA512

                                                                                                                                939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_1\_locales\en_US\messages.json

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                578215fbb8c12cb7e6cd73fbd16ec994

                                                                                                                                SHA1

                                                                                                                                9471d71fa6d82ce1863b74e24237ad4fd9477187

                                                                                                                                SHA256

                                                                                                                                102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1

                                                                                                                                SHA512

                                                                                                                                e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_1\manifest.json

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                35068e2550395a8a3e74558f2f4658da

                                                                                                                                SHA1

                                                                                                                                bd6620054059bfb7a27a4fff86b9966727f2c2b9

                                                                                                                                SHA256

                                                                                                                                e2f418c816895e830541f48c0406b9398805e88b61a4ec816244154cd793743c

                                                                                                                                SHA512

                                                                                                                                4bcb971d7353648abf25aca7a4a4771f62bbb76f8fc13bde886f29826d9314f5101942492004fc719493604d317958b63a95cf5173f8180214f27d6bea303f97

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_1\service_worker_bin_prod.js

                                                                                                                                Filesize

                                                                                                                                102KB

                                                                                                                                MD5

                                                                                                                                4e0c47897bf98deac56f800942e150c4

                                                                                                                                SHA1

                                                                                                                                7903d30e0acee273724bdaa67446d9fd4e8460a5

                                                                                                                                SHA256

                                                                                                                                fe76ea0c2f81e6140f38f4143b40be85014b93ff80737600cfb39aeb5c8c6537

                                                                                                                                SHA512

                                                                                                                                8b31463fc683439bab5d4aefe2be0f6a9f5b695c2d95aff3f842bfc74b10ae3d386d288121161506f74a08fb86d25c1096da4177b768254bf84e83983982640f

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                Filesize

                                                                                                                                2B

                                                                                                                                MD5

                                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                                SHA1

                                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                SHA256

                                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                SHA512

                                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                9KB

                                                                                                                                MD5

                                                                                                                                13955850d15e8bd5908901b8942dac3e

                                                                                                                                SHA1

                                                                                                                                8b4632bc2b8e44e9f045fc15262573848b179ec0

                                                                                                                                SHA256

                                                                                                                                c951920c0235a1ba644c446d2798d6b5b86077a43eca83398d6ed4d492648de3

                                                                                                                                SHA512

                                                                                                                                4c4a9589204acac183130b5c719c76d8f00ab50637654a430e723d3bb6e47354dd10844abbd8e8dafeeda9bc547268c62f98373d2dea7665bf45115a4da46ffd

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                231KB

                                                                                                                                MD5

                                                                                                                                24d23ab857fad7eecd28f8d0100c5f85

                                                                                                                                SHA1

                                                                                                                                58b20c6862471c508b7966d536033f0c13ccd82a

                                                                                                                                SHA256

                                                                                                                                a965a5772a3bf563a4a3ac4a5c52ee0435332557754de1265227629f61a1d095

                                                                                                                                SHA512

                                                                                                                                f5dabaf55b3f2159fd92f729810c50d058730459a3ca0c593f923bf112fe74465688d8b64bc95cfc6fe1ccbe6ca63ffcf6bc58ad137cad8ef22fd7a5507fa907

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c31f5337-8bd7-4cf8-a528-e976b68c63e2.dmp

                                                                                                                                Filesize

                                                                                                                                10.5MB

                                                                                                                                MD5

                                                                                                                                f30219fd8c829f6178f54673b842364e

                                                                                                                                SHA1

                                                                                                                                ddce74e4392fde426ab82806d282cc197f53c640

                                                                                                                                SHA256

                                                                                                                                f56982a2426fc97de8a4c1ac47d98ad16027dcadebab30a12594cba74aa9b8e6

                                                                                                                                SHA512

                                                                                                                                2b674bab1304d3a7df8299fe9bdd0ca95d2e68a49e2665232a1ca385fa5f573de512923f3c3110f22b9bd08d9106c2b6b0d5763b1aab62e1e4a1a0d334cba1b1

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f7d0ea75-847f-4ac5-a568-d50942a994ed.dmp

                                                                                                                                Filesize

                                                                                                                                10.5MB

                                                                                                                                MD5

                                                                                                                                10d381c4677237f4c50d775209004881

                                                                                                                                SHA1

                                                                                                                                a41651ff41223e89809c128211d740951cf1a00b

                                                                                                                                SHA256

                                                                                                                                2bf3f98ad332e03dafa0db1281b709649c3f97a684bb41f733043d37aacd79c4

                                                                                                                                SHA512

                                                                                                                                8f57831f3d5c6cc385c385a96b6748c7c405945fb48235efd7e1ef8365e575e856046074be8a2e8cf2932094bfce0fb075838c1bd3331bfa4d1c783928863cc4

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                152B

                                                                                                                                MD5

                                                                                                                                7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                                                                                                                SHA1

                                                                                                                                010da169e15457c25bd80ef02d76a940c1210301

                                                                                                                                SHA256

                                                                                                                                6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                                                                                                                SHA512

                                                                                                                                e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                152B

                                                                                                                                MD5

                                                                                                                                0dcac46f784240d87fe756516f1efce4

                                                                                                                                SHA1

                                                                                                                                e0762647a1c858d70bb7b69f3cab0df98bf6b3bc

                                                                                                                                SHA256

                                                                                                                                d66a0355c6c8c25fd4e70fd3b2b13b971126286e09c547d55570623722a3ca79

                                                                                                                                SHA512

                                                                                                                                2039e540361b941a93a35d7890c615b11378bf74e21b3c27f56d754b0b67a0d4de243b0c7b78688570f78dab25d699d97774c72af4af373bc6a81d7e0cfe937e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                152B

                                                                                                                                MD5

                                                                                                                                85ba073d7015b6ce7da19235a275f6da

                                                                                                                                SHA1

                                                                                                                                a23c8c2125e45a0788bac14423ae1f3eab92cf00

                                                                                                                                SHA256

                                                                                                                                5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                                                                                                                                SHA512

                                                                                                                                eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\165a6c45-f38f-41f7-875c-d7d524498f22.tmp

                                                                                                                                Filesize

                                                                                                                                1B

                                                                                                                                MD5

                                                                                                                                5058f1af8388633f609cadb75a75dc9d

                                                                                                                                SHA1

                                                                                                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                SHA256

                                                                                                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                SHA512

                                                                                                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                689c25eae892ead4ca4256440588543d

                                                                                                                                SHA1

                                                                                                                                3a1d5aea70f1dee3dc5960b7327a86e7dc1d4e5f

                                                                                                                                SHA256

                                                                                                                                4a91155b2b19959841ee2d5e3628786ec9b8e10723a356e41a9816dcd448a99f

                                                                                                                                SHA512

                                                                                                                                e50f11c3cae8e618a0bd422df6efcd43b11d61851cd3d0eb26f38150667901ebdc5ad4e4b9591fc33c773a7d79ec53c2cafb5cfd25bddb0e064bf6a024aba612

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                d0baea08924fb1cdc8eba296193b57d6

                                                                                                                                SHA1

                                                                                                                                76d978c67fcea00b305a7a2e0ec91c46c7c5248c

                                                                                                                                SHA256

                                                                                                                                8a20096b569810438bb605668e11a99b64909f48b72043bc71c854f6615b0351

                                                                                                                                SHA512

                                                                                                                                e39222231b0b8d6a644ab204034eec9e967f49c0fbdcc4c874fcc1cc3323a8ca418363e8b1d7dc42ee4ce29e89e413ab99967eb7a4e90ff30b2b5d0226419eea

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                Filesize

                                                                                                                                264KB

                                                                                                                                MD5

                                                                                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                SHA1

                                                                                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                SHA256

                                                                                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                SHA512

                                                                                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                Filesize

                                                                                                                                18KB

                                                                                                                                MD5

                                                                                                                                7faeefb12eb6b1e9bf8a144eca64220b

                                                                                                                                SHA1

                                                                                                                                7e8040a1a40990d93a688af758c6c0c4230a88f1

                                                                                                                                SHA256

                                                                                                                                9543d16c4629511c5908bc37d7613f3c41a9c9961b04cba81ac8a95b837d572d

                                                                                                                                SHA512

                                                                                                                                51ac56a5a6d9e113eaf99df155ddfc473b855b224791844927ab4337c27a7f528aec2809ba5013fdbba70db64b0c002cdc50fecf253daac815f95f134706bbd0

                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                                                                                                                                Filesize

                                                                                                                                13KB

                                                                                                                                MD5

                                                                                                                                8e532266081a65118a0000bb9fdb0799

                                                                                                                                SHA1

                                                                                                                                68d4541ee5c9248f5560a81884ee421e997c5889

                                                                                                                                SHA256

                                                                                                                                835ac8d82f8768c8a978d6c63002df8b8f8120cfa351c3a91552c84eb36e850f

                                                                                                                                SHA512

                                                                                                                                52f33e59b1160431b399ce9c18c7207cdf79df019df5e15ef67ea4097579f7944561ee2a879691a452955aebf0d41a0c15855bdfd325bdf5caf64acf9d7a3a07

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe

                                                                                                                                Filesize

                                                                                                                                14.4MB

                                                                                                                                MD5

                                                                                                                                155422526c81faf880ec711b7044ef44

                                                                                                                                SHA1

                                                                                                                                67b6a590e3aac3cca79d849ef1ac9f51f4e6702b

                                                                                                                                SHA256

                                                                                                                                3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a

                                                                                                                                SHA512

                                                                                                                                0a53e0b00e5c32782be998a082cc33bf5b19d162f81e39104f6fd6f64b1ea4947e69298493dcb49a1386904cc345c63395044c01be2d49c89647d7890522dbdc

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1004359001\DuncanAdvancement.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                6309329d5a036aacee830839f82c5b2a

                                                                                                                                SHA1

                                                                                                                                6862500fdd7e9741ac7b54ee2d7060e5e28d7f52

                                                                                                                                SHA256

                                                                                                                                7305c4bb03ec5c017a4297e7e47d7749e56ca5bb56d3d5399a37cd0ae6b3bfd0

                                                                                                                                SHA512

                                                                                                                                0f0b56e70d88418bba971d28c42b16534dd16d706d0b9bb9b372b80860ff579eed8c0a3984654933ac5b6717aa34a2bcf6c1a78f6ea45e0953b3a9fcd85737f2

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1004360001\df749a5787.exe

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                                MD5

                                                                                                                                dfed5f9f53be3a0090696db131f9380e

                                                                                                                                SHA1

                                                                                                                                97714e3b59f8406566ee305a5937b97b95a6ea6c

                                                                                                                                SHA256

                                                                                                                                b2b8924bf8517aa536decc71dc9bb3147187284ddf4d1ddff24986ce08053a97

                                                                                                                                SHA512

                                                                                                                                84fac4d7ed56bc5f43855488f22b67a4ffc9e3400a03b26b8704b7ad957c1c87ae7156695d98ad680bce05ea0c30e8cfb67bc757d5a2a58c1c39499bd498c990

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1004361001\7e5a3e77f8.exe

                                                                                                                                Filesize

                                                                                                                                2.0MB

                                                                                                                                MD5

                                                                                                                                d75cd72f7154399e60b3a3b1801512ed

                                                                                                                                SHA1

                                                                                                                                1808e1df096edf223855c2269562b93e031ca3b0

                                                                                                                                SHA256

                                                                                                                                d238402f837f3ca9b607245fff0f8390398f842344664e3d5af2ab33f8cbc016

                                                                                                                                SHA512

                                                                                                                                b388a1c4915bcfc68d4f9345773fda004dd06143ab1f57fd7d0c3aa4134fa73ee6e412f9dae18bdc12fd6517db78d76936c8f4af4629d79da04d0213c5665ae1

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1004363001\912eff0b3f.exe

                                                                                                                                Filesize

                                                                                                                                2.6MB

                                                                                                                                MD5

                                                                                                                                7bc18fd9c7c32912b43ee71e2ba630e5

                                                                                                                                SHA1

                                                                                                                                a1b4099b9956c886a15320bc28f748aa30ab9c75

                                                                                                                                SHA256

                                                                                                                                ed3502300b972ed5fdcc443958734a9171bb5dcf2ea140a98fe29f29c8c57d5e

                                                                                                                                SHA512

                                                                                                                                23c85b9c9f78d3bc023aad881a752deff5e5518469df7c56d04a952267e4741a64b3b502b551eccc98c05b32aae22006bc93ab0c1a1719e717fd6e6958317313

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\385902\But.pif

                                                                                                                                Filesize

                                                                                                                                872KB

                                                                                                                                MD5

                                                                                                                                18ce19b57f43ce0a5af149c96aecc685

                                                                                                                                SHA1

                                                                                                                                1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                                                                SHA256

                                                                                                                                d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                                                                SHA512

                                                                                                                                a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\385902\d

                                                                                                                                Filesize

                                                                                                                                1.2MB

                                                                                                                                MD5

                                                                                                                                6ce26bc637e613fb26e36e3b7b2de741

                                                                                                                                SHA1

                                                                                                                                fc871ed51cea45e036f2f5da2560028aac6a8d52

                                                                                                                                SHA256

                                                                                                                                b9f9f94aae237bbc79016a5c6f16699e5bd3e2c4badbdc38e1cfb381c0ee0f19

                                                                                                                                SHA512

                                                                                                                                07fd8349c544c26033baa348ebd5808bff902c296a2d096af318321bb51e5a85a4cc9c590387a35e8eb5a159dd30c32036d4a9f725b66be53e6d49e28250e31f

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Cape

                                                                                                                                Filesize

                                                                                                                                13KB

                                                                                                                                MD5

                                                                                                                                af965d3d1dace1fb30ca33675fff2b9c

                                                                                                                                SHA1

                                                                                                                                1d64d15e449fd45159c37b44c5066106280e98dc

                                                                                                                                SHA256

                                                                                                                                3ee9287e6608befe365048f434056557411daf82b5d94124b5ecd2f12893a0dc

                                                                                                                                SHA512

                                                                                                                                158ff9175f7052062ad53e620e6cdb585d4f6f696c330a50050a4a89c8e74c2bae49abed1a6b49fdb97938062e5554178d90309c621d56ff224d0ca4871086de

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Clock

                                                                                                                                Filesize

                                                                                                                                79KB

                                                                                                                                MD5

                                                                                                                                6b8d55cf0157a09b1304a79882cfabf4

                                                                                                                                SHA1

                                                                                                                                359e84b9a9f23827f2113be4e798a89109a1c4ab

                                                                                                                                SHA256

                                                                                                                                ccc80113d1d33bd46957e01253217e5e233fa0158107e4a1576d5137c9351450

                                                                                                                                SHA512

                                                                                                                                8d92bed7361a6cf6986bf505054b818b6f653c6eb493a66bb17e5aef26e5868e31a1948ede87b9f1976360f3bb86767c26ec4333bba41b599c0c1dbc002b68e5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Contacts

                                                                                                                                Filesize

                                                                                                                                97KB

                                                                                                                                MD5

                                                                                                                                06d5ec821bc37509d3888623e943bcbf

                                                                                                                                SHA1

                                                                                                                                e4ab272ef4feef067be2ab6672cca7b06d97e383

                                                                                                                                SHA256

                                                                                                                                f85ddce46c17d6da8061f7e84bd681d804c299fcdb51470ee17132b35eadd1a9

                                                                                                                                SHA512

                                                                                                                                1b250c226e6a54484632cd4894e3ed8deb0873db5f3a5c0ec5d5c006e266c8fb668cb83145df7c9d124b78ed21bea0086a7b7437f83f5ba3e87cfc5fa2c03e4c

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Dirt

                                                                                                                                Filesize

                                                                                                                                78KB

                                                                                                                                MD5

                                                                                                                                cde4c46ff3b0d6b46cdac32438fb47de

                                                                                                                                SHA1

                                                                                                                                170ea674921b4c3b713df5f6a61d86af9332b028

                                                                                                                                SHA256

                                                                                                                                48e24d58ec13a7c191c32588b7a1d3d36bbe93f009d0508b110071d1b83e20e7

                                                                                                                                SHA512

                                                                                                                                c1ca7075cdf1c472080d10e40ecb5cc437630b4f88e44a892be6ec6301e68237c4a2a94bf232afbde56b904af212257e45a3231577fea15b9c1d843fb66a57da

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Gross

                                                                                                                                Filesize

                                                                                                                                72KB

                                                                                                                                MD5

                                                                                                                                a0703a99dd4463e54652235fa8925efe

                                                                                                                                SHA1

                                                                                                                                6e4bf1852e8c9c08a33873da1fbcb405e63ea7fa

                                                                                                                                SHA256

                                                                                                                                edf34aba0958a5139d73f4c96bb45a7eae4e265483118d7e8636677facbd9431

                                                                                                                                SHA512

                                                                                                                                2015644ba3bdc8a7fa2e19a970bad8778de9a37699327a10807abdb251b8f07e71db8d03a2bf0df6cf641b6ff66df2b9899f725c1e88d688090dbdc23ae96a8b

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Highlighted

                                                                                                                                Filesize

                                                                                                                                75KB

                                                                                                                                MD5

                                                                                                                                76877395939bbfdfc0bc89b5cd81dc98

                                                                                                                                SHA1

                                                                                                                                856453e7c5aa1f00badb3179d4179683d151ac34

                                                                                                                                SHA256

                                                                                                                                09388133db1b51106b865257278e9ac5aae1a03471655d66dd08d84e4b7bdb34

                                                                                                                                SHA512

                                                                                                                                01b1c5bc5ce697e9b08e20af194cd3631e80b15467aa699d9afab119dc134cfc35fdb76ddff0d564f7f48c2f0c35820fde7c37bfb51778b614ad49e81eb1a4c0

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P0C56.exe

                                                                                                                                Filesize

                                                                                                                                5.6MB

                                                                                                                                MD5

                                                                                                                                751c6459d49eb3f108970e4c147a8786

                                                                                                                                SHA1

                                                                                                                                3faca7437ebd4cb7b3b6d75ede4fb299b7926dd7

                                                                                                                                SHA256

                                                                                                                                4f1bde935e86baa0792d7accbb0771adf90932c9f3e9956ebb593350f9152913

                                                                                                                                SHA512

                                                                                                                                5025b43e05535cb8366a8991e295c1738977de2fea70f994cfc99423709b549096ad76be4a3547fd22359a66d3ee8ec104250e115492fa39fe2e83db5e03ced6

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3M04K.exe

                                                                                                                                Filesize

                                                                                                                                2.1MB

                                                                                                                                MD5

                                                                                                                                fffdaffb81d0e752ae14ba04b8b6064f

                                                                                                                                SHA1

                                                                                                                                3056c80dfded82c41b439c8344f6aa62c745398c

                                                                                                                                SHA256

                                                                                                                                6b54559b4d5c5e0413800f434d2fc29409020ad60ba08e65f6df117907e651ae

                                                                                                                                SHA512

                                                                                                                                af6f7054117ee499a835100c2c9b069b4e036db9f271fba6e44c749346b515470362086aef59b4f56d1e7fb988eda6db55c7360a702a343e1564afdec66ff112

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A4Y48.exe

                                                                                                                                Filesize

                                                                                                                                3.4MB

                                                                                                                                MD5

                                                                                                                                75f7a5c0cba1d6eff288bfbfc3718f58

                                                                                                                                SHA1

                                                                                                                                776873981c9d2f8cd99b379601eae31567ac2d32

                                                                                                                                SHA256

                                                                                                                                cb78a8c6e48d22abf8fb91da38e31b9634d544c69c82139c15c513c97e7f6076

                                                                                                                                SHA512

                                                                                                                                22cdc7cd2c6353502fdf852129a91c82490ae1d45454bef6ba03646c22e4a0b8cc45c41a358980b5caf169d2f26c5f60479a83e12e0161659c1ec5f9b577ac8a

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u98q5.exe

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                                MD5

                                                                                                                                7a2899d7d3ab3533ccfb073dcfd7b18e

                                                                                                                                SHA1

                                                                                                                                7d2640e6b393d8b8d6e410c6678e693d502fd0c5

                                                                                                                                SHA256

                                                                                                                                8456623478b7f0d70eb23a4ef843aa4f739e61c06668e0139fc42084fc45ad40

                                                                                                                                SHA512

                                                                                                                                29a39d885b47af96702087eed0d6ebf2ae5c6ebb6c33bec6aac5235eb2d2333ee464b849090aeea924474834224585045fac1447957e29cc1eed2442470656d8

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c2181.exe

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                                MD5

                                                                                                                                f4066dbb286bd3eff3217e23f69af979

                                                                                                                                SHA1

                                                                                                                                1716f539fdc3cbedd555ed0c20d2a1ea4e20a38c

                                                                                                                                SHA256

                                                                                                                                0618b31240c08f9ff8b79078e5fbfa16a248ecf2958f4a17416df82480d16aa1

                                                                                                                                SHA512

                                                                                                                                6a305ee9b8aa6546baea7b486bb55edc3afa5ad9e1aa196852fd7e2e9682919a7780304b6deaafbefa7ccc380e9926bea8640ae5aae6d0a638c1e63e9bc35e5e

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Infected

                                                                                                                                Filesize

                                                                                                                                60KB

                                                                                                                                MD5

                                                                                                                                62dae5d3236399e12a9b6aa7b6234e17

                                                                                                                                SHA1

                                                                                                                                bfcff7698ee522692844d1fe8d2eae1956b72177

                                                                                                                                SHA256

                                                                                                                                7bd5d3c8d61f2ffa76a0b577e26c1ceae0e3b06e862610687306255d415a0cd0

                                                                                                                                SHA512

                                                                                                                                6dff2292821e0b7326af592c64335c2bd8619339c8ad61a78c9405550adaf63538a835b45f2a8deb9df6c5235a8c8e266df55d8dfc1442a8f2282ab6973166e3

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Isa

                                                                                                                                Filesize

                                                                                                                                89KB

                                                                                                                                MD5

                                                                                                                                b40befe54498a6d595b364b7b525f30f

                                                                                                                                SHA1

                                                                                                                                f8881f753450e7265fcde49d405c07198c94beba

                                                                                                                                SHA256

                                                                                                                                f25f42d199259454fad606804668bdd177a5bc0d03cf56d3c2cb68e393a439d5

                                                                                                                                SHA512

                                                                                                                                716cb614a1cc28de222917d1cbcb4f73def6b523f2b9c871c7c09fd6bfbe511390a11c568133633739fea4f1795bc6b83a1baa51186d6a9654b6fb70ddf2dcbb

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Liquid

                                                                                                                                Filesize

                                                                                                                                70KB

                                                                                                                                MD5

                                                                                                                                bbf271eaa9d8aeaefa40cac9e19a7838

                                                                                                                                SHA1

                                                                                                                                49cbfe8c945a849c39779a60c7866b0dea329bae

                                                                                                                                SHA256

                                                                                                                                4d43fbfee58142287d8e3c0ec3005b50dd110248a7e0ec1b891dce2501b8ca5c

                                                                                                                                SHA512

                                                                                                                                e6a3c6d1facd1b90669ba52f90ed46ddd921ef0b1dd99948220eeeed5d60a84e7a126e9a01144fb95e18dc6fbe4abcade35a58fb7dca3c52e83010a1e6208a44

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Mas

                                                                                                                                Filesize

                                                                                                                                92KB

                                                                                                                                MD5

                                                                                                                                fa0509a52879aa4a62f19d057a88bac3

                                                                                                                                SHA1

                                                                                                                                109c5e34cdca7a5664f433ff8f1c44bda24a164b

                                                                                                                                SHA256

                                                                                                                                a0dd14e2a3b74fd5ca903446dd99bac3d7918748eeff693658d4790f00097532

                                                                                                                                SHA512

                                                                                                                                321a2b7380544ef5faf1912b4eede29f76cfa6ccd2be7aa7c6ae5efbf0a5a3503ec7da541de3e83e6db0c70a5ca38f8cd97735a1faf475917a598fc5eac36254

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Ministry

                                                                                                                                Filesize

                                                                                                                                84KB

                                                                                                                                MD5

                                                                                                                                7be94726608f8c106665afa8cfdc89bb

                                                                                                                                SHA1

                                                                                                                                59e8662e8d5f0c6880a8935ae0cb81a089980eb0

                                                                                                                                SHA256

                                                                                                                                803b70d8ab4f2e9c764b9e43c26039da2b0f985f6728971fcc623289f02187aa

                                                                                                                                SHA512

                                                                                                                                21babae17d2db7aebca44d11876d53efac58652ff6b73076eef6f4b9ff9b685bc0a8541155132b399fd166a376ac4b56eed72b7a4a2f61ff6e1a808e2939feb1

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Preston

                                                                                                                                Filesize

                                                                                                                                59KB

                                                                                                                                MD5

                                                                                                                                3f86bb99af0bb655504dce21757c744b

                                                                                                                                SHA1

                                                                                                                                7a6279dbc69d3cb87717fbc34900cad4acdb27f3

                                                                                                                                SHA256

                                                                                                                                d97cdda1db2bbd8ffcd46144b245aa410232e7d1d075b2c576eb49206c0e18fd

                                                                                                                                SHA512

                                                                                                                                e46d4c23061f0bffacf30dffce5a7d5e893e79e699dd6de40a5493c2744ea2efda586900587fc955d699db16e96009c4f30c46f23130c92eeb04274ade71672a

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Reforms

                                                                                                                                Filesize

                                                                                                                                70KB

                                                                                                                                MD5

                                                                                                                                b8d9068ad91d42e750a76d26003f9fa4

                                                                                                                                SHA1

                                                                                                                                c75eb994cf1c607de148db30cab2bae30e00898a

                                                                                                                                SHA256

                                                                                                                                d3cb08d75bcadec46233d8097f1580ac1ff763ecefbcd74172801c574ff4a93f

                                                                                                                                SHA512

                                                                                                                                ce911583ad373a45d5dae61b95a9a3742a831d245c9f8b005cc86aea92445b63b72643e1384424277f5961e0c49bc9be0171a0ef998b518a65f2cba984ebecaf

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Remove

                                                                                                                                Filesize

                                                                                                                                66KB

                                                                                                                                MD5

                                                                                                                                a529d544a10836bedf47c06c4d52b25b

                                                                                                                                SHA1

                                                                                                                                dd03707284f9fc7d8980d65a8ba19318df9544ee

                                                                                                                                SHA256

                                                                                                                                a3974c65e3dfea5864655fb0ed24bccfaec7539a20d7ffac41c1201a351223cf

                                                                                                                                SHA512

                                                                                                                                1fd747ff5096bc26f8e740e2f730059fc11aa1d2e7db2654fe19115e5457cf7b8da1ac0233461a4fac1d0aaad6f2c81c10160dda39fece6b09a8c241e4152dbb

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Rotary

                                                                                                                                Filesize

                                                                                                                                95KB

                                                                                                                                MD5

                                                                                                                                6051b9eecd39a03bb32bc2bba5082095

                                                                                                                                SHA1

                                                                                                                                b2a63fd5e96493699fe067cbfa099622d8acea32

                                                                                                                                SHA256

                                                                                                                                4f12f27328c4c0a600c6850d17aa237e75f23b66a74cd1ec7e5f9cfdc299ca30

                                                                                                                                SHA512

                                                                                                                                6223aa52de9df2f999eee13dc61be08954cbacbd5ffa83831d4a11a0ed35bf36dce05c0f5b3eeb5a7a0759cebe313be9c3d8486d22e3d063eaec9a76adead8b3

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Scottish

                                                                                                                                Filesize

                                                                                                                                11KB

                                                                                                                                MD5

                                                                                                                                91f6672574a6fd8cbbad8d6cd414d156

                                                                                                                                SHA1

                                                                                                                                643c062c6b131258149503ed4219de12d92e3a68

                                                                                                                                SHA256

                                                                                                                                044aea42dbeeba30d10e5cf9bb40ea12840de423a13d162bdd366cd12c9c2213

                                                                                                                                SHA512

                                                                                                                                f62112c697dd33eaa3c5590f728900303eaf7c34c29e36be6a56b82161bb2fb059f37539ce3fd2b1e93c326db003d51396aadc69b8870a02e286c6912cf8fee6

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Sequences

                                                                                                                                Filesize

                                                                                                                                861KB

                                                                                                                                MD5

                                                                                                                                2dd483c6fde0586ffa94acc2376dd7d9

                                                                                                                                SHA1

                                                                                                                                c9ef9e4d9a0185ebed8ff26a1dfbf83c954ec09b

                                                                                                                                SHA256

                                                                                                                                40c07fbaec3090d544f2d764897ae01cd7e8e8e97ac95f769c9d09bc3c660195

                                                                                                                                SHA512

                                                                                                                                314d03f8c2e3b9b67349d82362620fe72e6c9356393ff5b72d343c781a14b4b1e5ff4a9f78782753d04028b208be5f8812e60dd830f323435b013f50b30aa33d

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Syria

                                                                                                                                Filesize

                                                                                                                                58KB

                                                                                                                                MD5

                                                                                                                                a0e351dd432603992449c20dc0c6ea0b

                                                                                                                                SHA1

                                                                                                                                dd6a250e1400f0ed460f5989968b38fdfad642bc

                                                                                                                                SHA256

                                                                                                                                ac7ae2f73b1035ea98f04caadafc74e8919f124e417a14966af4a41fbef0229d

                                                                                                                                SHA512

                                                                                                                                d07c1e176b23fcf307df0181d1b24ea0e202206d59d87cfe0d30214de4571d88bf6edee33fab8540a12afb0527098c25ecf5a0a224d4a71d487737a48318f86f

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Trout

                                                                                                                                Filesize

                                                                                                                                88KB

                                                                                                                                MD5

                                                                                                                                1a6f03d3e9d3165a38d8b59cf0b2d4bc

                                                                                                                                SHA1

                                                                                                                                bab5dc699a736cbba1c64f2ecfc84f3a194ff51c

                                                                                                                                SHA256

                                                                                                                                755ffe7b3854437f7d1a85aa929a353bd0cb8f84d9e2899cd9ad29d7733e6496

                                                                                                                                SHA512

                                                                                                                                dd98537e73522e9d55112368de9b363622a0804d5159deeb1760b2803221f5cca9957a734db315afa0c3b907887765c3cc4c98991b65be5253c5e2bdd6081cab

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Za

                                                                                                                                Filesize

                                                                                                                                16KB

                                                                                                                                MD5

                                                                                                                                29a0ea7fbce305cb957d7f88a2eb1d6b

                                                                                                                                SHA1

                                                                                                                                eed117e955aad6ac880bab3c530634da6bb6315f

                                                                                                                                SHA256

                                                                                                                                229d200f4b5bf50af37b19d601448152886be2e6110a7f7de7d5b91e4ed54d26

                                                                                                                                SHA512

                                                                                                                                4a63a11cc013295a5c8677c66e6386412ff58ce53a77a92f7ba7d1004960d5b1c27922fa006c3e48d06ebb76bc491753dbe7ca23ce88c0f424110655977b0d44

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir3900_692570859\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                                Filesize

                                                                                                                                711B

                                                                                                                                MD5

                                                                                                                                558659936250e03cc14b60ebf648aa09

                                                                                                                                SHA1

                                                                                                                                32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                SHA256

                                                                                                                                2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                SHA512

                                                                                                                                1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir3900_692570859\f8efa5a8-25b8-4eaa-a4de-729ca8e2b54c.tmp

                                                                                                                                Filesize

                                                                                                                                132KB

                                                                                                                                MD5

                                                                                                                                da75bb05d10acc967eecaac040d3d733

                                                                                                                                SHA1

                                                                                                                                95c08e067df713af8992db113f7e9aec84f17181

                                                                                                                                SHA256

                                                                                                                                33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

                                                                                                                                SHA512

                                                                                                                                56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir5496_1170642925\CRX_INSTALL\_locales\en_US\messages.json

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                64eaeb92cb15bf128429c2354ef22977

                                                                                                                                SHA1

                                                                                                                                45ec549acaa1fda7c664d3906835ced6295ee752

                                                                                                                                SHA256

                                                                                                                                4f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c

                                                                                                                                SHA512

                                                                                                                                f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir5496_1170642925\CRX_INSTALL\manifest.json

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                2d15a6576d5d85222f9f367c286205d5

                                                                                                                                SHA1

                                                                                                                                a51fccba42570f45a57b3e3951da75eb553eeb81

                                                                                                                                SHA256

                                                                                                                                31e923ef15ac783399d5a4ca5c67e96342cf7f18437843e2a3f55b551c6dbce6

                                                                                                                                SHA512

                                                                                                                                92217626f79111b1329a3c91ac4923354aa8fc31fd7ba7428a256e9acb35825d6ea28fde02b4ae44914adf359b3dd11d16f274040dd8e675f2aba66139b52661

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                Filesize

                                                                                                                                479KB

                                                                                                                                MD5

                                                                                                                                09372174e83dbbf696ee732fd2e875bb

                                                                                                                                SHA1

                                                                                                                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                SHA256

                                                                                                                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                SHA512

                                                                                                                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                Filesize

                                                                                                                                13.8MB

                                                                                                                                MD5

                                                                                                                                0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                SHA1

                                                                                                                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                SHA256

                                                                                                                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                SHA512

                                                                                                                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                                                                                                Filesize

                                                                                                                                6KB

                                                                                                                                MD5

                                                                                                                                5029f54a91a86fd385d75685cf155d6d

                                                                                                                                SHA1

                                                                                                                                61284bfbd3d6a3a92a8944e1e8ac1daf07eb9b27

                                                                                                                                SHA256

                                                                                                                                3e0542c505135293e80346db587de0900e067314d5e975f671803c0bccbc9430

                                                                                                                                SHA512

                                                                                                                                696093da662282e1a2d6020d05aae9005c47ce8a2e3f7b2a768823303028985ee8dfe48f4b0701af8b00951b365fb8b8461255349b4d606be9ba5b262af4b3a7

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                                                                                                Filesize

                                                                                                                                10KB

                                                                                                                                MD5

                                                                                                                                38d3ccc3c82b0b81002aea13b5bd5c72

                                                                                                                                SHA1

                                                                                                                                535d31e00516dad1594a939668fd0990bf851b12

                                                                                                                                SHA256

                                                                                                                                3474e37f15fd4e3cc54e36147154b7f7cbe307c0ef91c52d0320daf5887b8ed0

                                                                                                                                SHA512

                                                                                                                                c4870f55362ac39179d93110f5e16ba27160aa79136bc133fecfac10c8605120b0485060f99c9e66d6d70cb7d8f6a69b2c963363ee5c547b5211808e2fc132ab

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                Filesize

                                                                                                                                23KB

                                                                                                                                MD5

                                                                                                                                3ab833e1dd0321f9b8f9b21083bd7b30

                                                                                                                                SHA1

                                                                                                                                b537101ed38e9335d8cc64f92dc19511006b2d53

                                                                                                                                SHA256

                                                                                                                                45ad0b1e96fba396c653ead46188837e12c9a357a44b3893ac8234cf9af8c093

                                                                                                                                SHA512

                                                                                                                                8daf6c0775f362c92399dec50b5fbfc76c02014df165d2156fc0119040736fc82ae798b7d275e755445ea598d01fb08c76e232e5958273961bb0d298bfeed750

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                Filesize

                                                                                                                                15KB

                                                                                                                                MD5

                                                                                                                                ee550129071459d7fc710122eece922f

                                                                                                                                SHA1

                                                                                                                                f47d32b23da85d6d7f5052cfcceb4737e95faa1d

                                                                                                                                SHA256

                                                                                                                                619c4f02c26556a497c054360ef130c884feaa348b2e39159cd24a88e46aade5

                                                                                                                                SHA512

                                                                                                                                ead84892986e599a92b85ef2ce4804469b888dbdc07e3de60e0deb54b503f6a5efacb3bf094f09272a087aca5338dba9e0e8f2a1a2ec25eb383306f004dc0dfc

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                Filesize

                                                                                                                                15KB

                                                                                                                                MD5

                                                                                                                                d69108219d78a48c51d69e3ccce8f825

                                                                                                                                SHA1

                                                                                                                                5db12581f7129a04f9e0516c6340a860e8a4ba8e

                                                                                                                                SHA256

                                                                                                                                c54daf4be9f74e81bd521b1707ccb1698e638d6ac6078889d646451d5055d0ca

                                                                                                                                SHA512

                                                                                                                                61bc9661e863b17a8413c8db937f542169a16ecb2efb2fc3196a766976a429bc15330993aef4303705c2e694c3b2e333d66df0741ec23bad56f6ceff4b65176c

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                184df12b56cc5d790750b1dec45aec0e

                                                                                                                                SHA1

                                                                                                                                f40e8af11b71229416a189a0d4f231c7912eaf40

                                                                                                                                SHA256

                                                                                                                                df7f280710f1db0a79adb24db917d4bb7a3819dcc2e4e501827788624613cfb5

                                                                                                                                SHA512

                                                                                                                                e8432bf7d1af9836960d7cab8530ba01a56046f386283882d2c2c8de57684ce7267d60ce6021bb2c1c01ee638e3779ce0b7abb05ced610361e0cd3c3b6834362

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                Filesize

                                                                                                                                15KB

                                                                                                                                MD5

                                                                                                                                604247f70ab827ee830a8a78fa7b85b9

                                                                                                                                SHA1

                                                                                                                                745382624fe46b6248aab67c78c1339dce63e088

                                                                                                                                SHA256

                                                                                                                                9fb7c9dc6be43b8d5bd3d91fa7af6c7772da0c4c38d5def9de5374ea1033fa03

                                                                                                                                SHA512

                                                                                                                                33a77c49e5c5808df99fce987094be763f93c898f310f25a0a31e685155402d464242858b49aea343355312851d5e6903a8a17592e56827df7cb60c7408f6e01

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\467d04a9-23b5-4029-9aa9-e850b497f5b9

                                                                                                                                Filesize

                                                                                                                                982B

                                                                                                                                MD5

                                                                                                                                2edf7b5f30d22b90b33e6e5813b694fe

                                                                                                                                SHA1

                                                                                                                                3647ff2a6f1e90a7f8967005c7beeb64343394da

                                                                                                                                SHA256

                                                                                                                                8f9f944a516fe70e95257491bda42dfa546ae1adc11f9890aebe55b037762304

                                                                                                                                SHA512

                                                                                                                                1df1a877bea91639dcb9ef8aaa692d6fb9122d62ee88c85879886e699d95383e7934abbd61877c5e14563f9e6eb8cf49d0bfdb15ad0361b470fbc9cba4f4f5e2

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\49aa527a-e104-4fcc-b550-6eb9951a0516

                                                                                                                                Filesize

                                                                                                                                26KB

                                                                                                                                MD5

                                                                                                                                e01f0934a3e13de30ddf6634cabdb5fe

                                                                                                                                SHA1

                                                                                                                                d09684a159cb65d4facdb44606afa5b608b008f6

                                                                                                                                SHA256

                                                                                                                                45244e62557aa497ec05b4100f79aa2027f80796811977828ada780e0711eb07

                                                                                                                                SHA512

                                                                                                                                294816f528c41094db25975913620c61735dbb2bc14081c455844863bfaf5ef2db3ede26ad4c4f128274ab4cd35cab049225def4a39e8cd8803ea49d8930811a

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\50111354-890d-4b64-9b5e-cbb0ea270745

                                                                                                                                Filesize

                                                                                                                                671B

                                                                                                                                MD5

                                                                                                                                d2bfb670b24a72d777a70dd002be354e

                                                                                                                                SHA1

                                                                                                                                f28894b0488f5bb38c37064ee16ced650e096b82

                                                                                                                                SHA256

                                                                                                                                542b0828a92990e4d371e5082ea4fc4c28d062410af6507c49c95abee21122f7

                                                                                                                                SHA512

                                                                                                                                b094b4635040df53b46f8fbca760950448edbb80d9810ffbbdf59390555e23548cc33c1eee367546520e569cd6a0252d8fc27a9598393ce8353cc871bd744c33

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                Filesize

                                                                                                                                1.1MB

                                                                                                                                MD5

                                                                                                                                842039753bf41fa5e11b3a1383061a87

                                                                                                                                SHA1

                                                                                                                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                SHA256

                                                                                                                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                SHA512

                                                                                                                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                Filesize

                                                                                                                                116B

                                                                                                                                MD5

                                                                                                                                2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                SHA1

                                                                                                                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                SHA256

                                                                                                                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                SHA512

                                                                                                                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                Filesize

                                                                                                                                372B

                                                                                                                                MD5

                                                                                                                                bf957ad58b55f64219ab3f793e374316

                                                                                                                                SHA1

                                                                                                                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                SHA256

                                                                                                                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                SHA512

                                                                                                                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                Filesize

                                                                                                                                17.8MB

                                                                                                                                MD5

                                                                                                                                daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                SHA1

                                                                                                                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                SHA256

                                                                                                                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                SHA512

                                                                                                                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                                                                                                Filesize

                                                                                                                                10KB

                                                                                                                                MD5

                                                                                                                                6acddb80a3bc1f3370aa849932ef2c78

                                                                                                                                SHA1

                                                                                                                                f0f1e5c84a33e589144e4613fac3df9ad32eb287

                                                                                                                                SHA256

                                                                                                                                ae31f4a1581ccfaee501be60a5d07b0a9e5eff4d5beaeef1a2c2ea87b5ecfaf8

                                                                                                                                SHA512

                                                                                                                                0a940c3bc018b26002bac03d3106301d3be58272dd544869ddb57a105b959cf2f1d2c53b56ca9f64d9955e0651ccbdcd7cf9b184bf50efc93934a4fa69be1ac0

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                                MD5

                                                                                                                                7cd2045dfaa5ba6e4c1aac7812251fd9

                                                                                                                                SHA1

                                                                                                                                44b15be3e73b72c5823781001ceebbc4b39a23d6

                                                                                                                                SHA256

                                                                                                                                3e70cf5ecbdb9ec30f4c96c3a2be54707e65d8b6dffd5f91571ffaa59b116b62

                                                                                                                                SHA512

                                                                                                                                a14563049c488e89ec7c7b850ccd69d199eb3027a5c6372cec4307cf8405e085abf77f8e52cfa4a08c3ccd377f4c8283f025a01f9056772d268dcd71dca5bc8d

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                                                                                                Filesize

                                                                                                                                15KB

                                                                                                                                MD5

                                                                                                                                75f7d65013cadd83de2ed81d85859f87

                                                                                                                                SHA1

                                                                                                                                2f18d67985c7f041d57ab493b85477bf5fa2a070

                                                                                                                                SHA256

                                                                                                                                2d7acd3f32f70b848e50b4b1f688382f416ae0cf1941c0805589659140e5ba9e

                                                                                                                                SHA512

                                                                                                                                cdc47969da7a35adf11295c8aa58b34974cf408bf002c793d3a83f4dba1fe665bf08879dff311c8ca016a1ffbca6447519bf07a8581c5f071fc25744a907fee6

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                                                                                                                                Filesize

                                                                                                                                10KB

                                                                                                                                MD5

                                                                                                                                9ac1d3552efa1b8a715c10bc342b609f

                                                                                                                                SHA1

                                                                                                                                743678963934064af20651e94096eb43f8fe870f

                                                                                                                                SHA256

                                                                                                                                05f03510cb0fe6a9c16cf464b2f607a4d30d5d100aabf86126817a47501ea277

                                                                                                                                SHA512

                                                                                                                                80ae67104ef77fdb71638961a835cffdaccea5e4f4cc950a7ad98b0504c09b69b3b1796a48fc25adb49a458d3e2b24d9a2404feb0b092edce562dd698be7f7cc

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\security_state\data.safe.bin

                                                                                                                                Filesize

                                                                                                                                2.9MB

                                                                                                                                MD5

                                                                                                                                fe0a606435f4e3d059182df1d90bcf7a

                                                                                                                                SHA1

                                                                                                                                49186738f6f4e627b9dfa32f2fcfa6506eb3a6b4

                                                                                                                                SHA256

                                                                                                                                08d9842956a182b42a29013ccbc72386167dba9f29be7e175e6dedcead39925f

                                                                                                                                SHA512

                                                                                                                                17631d9e2c4e1fc036ddcb0ea43a85324023c6ecc277e0808252d0d4e41545ebab81aa437313e7b57bb865c0ae04f6d15e60bab6f30a31faef61c32de64e5f27

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                Filesize

                                                                                                                                2.9MB

                                                                                                                                MD5

                                                                                                                                16eee8a6ab6913684cbf75f3cbd2bcc3

                                                                                                                                SHA1

                                                                                                                                38e2da719dcbe3e322f995c473ce664031496de9

                                                                                                                                SHA256

                                                                                                                                399cf03d6c57f377d7793596ed03bbdd7729ff52795d278926822daebe836053

                                                                                                                                SHA512

                                                                                                                                a53f53dab71ce52db25b335a654dec87e319476d0c545711f2a13a579a6ce442472025f212b404f71cd0fb0febcd52db7070cfe8e1987c1e8b35be6bba03ed64

                                                                                                                              • C:\Windows\Temp\{7F2382E4-3DDE-4177-B234-9D32D789014B}\.cr\sxqnmytm.exe

                                                                                                                                Filesize

                                                                                                                                14.3MB

                                                                                                                                MD5

                                                                                                                                73e9ab1674c64f040da642b6a4690356

                                                                                                                                SHA1

                                                                                                                                e5a508bf8a7170cbacd6e6ab0259073a2a07b3cf

                                                                                                                                SHA256

                                                                                                                                04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c

                                                                                                                                SHA512

                                                                                                                                f1df00e8f0b7b1c577429028cd550788dbf4f1da1e8aa97b8ab845e68c56663c350c562f26237a278a0b44b33f06dcb9667a50db4ddaf747da71053e4189afec

                                                                                                                              • C:\Windows\Temp\{8D9EDA9C-122F-4546-B1E2-3767E85D6677}\.ba\Bichromate.dll

                                                                                                                                Filesize

                                                                                                                                1.4MB

                                                                                                                                MD5

                                                                                                                                86b7452f87b5c7f79f8b8a3ad326035e

                                                                                                                                SHA1

                                                                                                                                a81ba71c0b3f93c6bcdc004ede3f98f205dd31ca

                                                                                                                                SHA256

                                                                                                                                58a6b1fe90145f8ae431d05952d1751e705ae46a81be1c2257f5e1e0ce0292c7

                                                                                                                                SHA512

                                                                                                                                4c0e8166a8ee81c9e851fe7d25915b1d85bbe3b274e88160ff948ddb8a15f67122a52ba3906da6a090f8ba064915c8df1780103e474bf8e6f3dd673fc304ce7b

                                                                                                                              • memory/428-34-0x0000000000900000-0x0000000000C15000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/428-20-0x0000000000900000-0x0000000000C15000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/1520-1104-0x0000000000480000-0x000000000077C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/1520-1043-0x0000000000480000-0x000000000077C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/2144-39-0x0000000000B00000-0x0000000000E0A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/2144-40-0x0000000000B00000-0x0000000000E0A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/2796-43-0x0000000000B40000-0x000000000127D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.2MB

                                                                                                                              • memory/2796-1086-0x0000000000B40000-0x000000000127D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.2MB

                                                                                                                              • memory/2796-1047-0x0000000000B40000-0x000000000127D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.2MB

                                                                                                                              • memory/2796-491-0x0000000000B40000-0x000000000127D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.2MB

                                                                                                                              • memory/2796-45-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                972KB

                                                                                                                              • memory/2908-1786-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/2908-1746-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/2980-1101-0x0000000000220000-0x000000000094C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.2MB

                                                                                                                              • memory/2980-1102-0x0000000000220000-0x000000000094C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.2MB

                                                                                                                              • memory/3496-5890-0x00007FF650B60000-0x00007FF650E43000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.9MB

                                                                                                                              • memory/3496-5900-0x00007FF650B60000-0x00007FF650E43000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.9MB

                                                                                                                              • memory/3496-5892-0x00007FF650B60000-0x00007FF650E43000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.9MB

                                                                                                                              • memory/3532-5884-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-5891-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-1105-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-1861-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-33-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-558-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-5781-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-63-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-2734-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-5905-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-1842-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-5898-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/3532-76-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/4084-5893-0x0000000000EF0000-0x0000000001205000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.1MB

                                                                                                                              • memory/5368-1820-0x0000000000C40000-0x0000000000EEC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.7MB

                                                                                                                              • memory/5368-1850-0x0000000000C40000-0x0000000000EEC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.7MB

                                                                                                                              • memory/5368-1853-0x0000000000C40000-0x0000000000EEC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.7MB

                                                                                                                              • memory/5368-1819-0x0000000000C40000-0x0000000000EEC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.7MB

                                                                                                                              • memory/5368-1818-0x0000000000C40000-0x0000000000EEC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.7MB

                                                                                                                              • memory/6412-2223-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-5483-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-5780-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-2306-0x000000001A6B0000-0x000000001A90F000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.4MB

                                                                                                                              • memory/6412-5782-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-1902-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-1904-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-2197-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-5334-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-1878-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6412-1854-0x0000000000A00000-0x0000000000D00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/6440-1856-0x00007FFC564C0000-0x00007FFC56A0E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.3MB

                                                                                                                              • memory/6440-1862-0x00007FFC5AD10000-0x00007FFC5AE82000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.4MB

                                                                                                                              • memory/6540-1876-0x00007FFC564C0000-0x00007FFC56A0E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.3MB

                                                                                                                              • memory/6540-1877-0x00007FFC5AD10000-0x00007FFC5AE82000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.4MB

                                                                                                                              • memory/6540-2288-0x00007FFC5AD10000-0x00007FFC5AE82000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.4MB

                                                                                                                              • memory/6580-5882-0x0000000072D30000-0x0000000072EAB000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.5MB

                                                                                                                              • memory/6580-2950-0x00007FFC78C70000-0x00007FFC78E65000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.0MB