Resubmissions

22-11-2024 02:40

241122-c6dcxsynem 10

22-11-2024 02:40

241122-c5xeeayndj 10

22-11-2024 02:35

241122-c22vqaspc1 10

Analysis

  • max time kernel
    390s
  • max time network
    390s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 02:40

General

  • Target

    68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe

  • Size

    21KB

  • MD5

    223b42adc2e6eeb342664ffa633c3a6a

  • SHA1

    00612d9ce02cde93cd73eebcbee0deece4da3f8f

  • SHA256

    68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361

  • SHA512

    8c2e1ca20137aa4871509dbf17d27eeed4ae13433f95b63eda48570b2158317d3d72edda78f7b6c43bbc4f39c5bf84d83988c6afd6a5e6f1bdcda331f82c6847

  • SSDEEP

    384:cs+2GqOOyQuluvnDS3d2dD03jVsV8ftnokwRwAoDNwAUPNtdI6+eQAozrBtHzkL:cs+2G8ZQ+SXjWooPjBBAtHzae6eX

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o62s

Decoy

lectrobay.shop

enisehirarnavutkoy.xyz

itoolz.net

otorcycle-loans-40378.bond

opjobsinusa.today

uara228j.shop

ukulbagus10.click

enhealth07.shop

cpoker.pro

ome-remodeling-16949.bond

andu.shop

hubbychicocharmqs.shop

onghi292.top

ussines-web-creators.net

alenspencer.online

ryptogigt.top

epiyiisigorta.online

ental-implants-77717.bond

juta.click

enisehirevleriarnavutkoy.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 51 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 52 IoCs
  • Suspicious use of SetWindowsHookEx 43 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe
    "C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361" /t REG_SZ /F /D "C:\Users\Admin\Documents\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361" /t REG_SZ /F /D "C:\Users\Admin\Documents\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2056
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c Copy "C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe" "C:\Users\Admin\Documents\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.pif"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3240
    • C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe
      "C:\Users\Admin\AppData\Local\Temp\68c3605100b20d0e04a069565f5ce7f6f55b7546f52dcf22328e3a321637e361.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1364
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2212428f-4ecc-485a-b435-f637b6c82753} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" gpu
        3⤵
          PID:4488
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be13fd02-3a14-493c-b8c0-fe318ee332f0} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" socket
          3⤵
          • Checks processor information in registry
          PID:3088
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3044 -childID 1 -isForBrowser -prefsHandle 2992 -prefMapHandle 2988 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {acb1f8be-735f-4736-8ff7-16500ffcd9d1} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab
          3⤵
            PID:4728
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2964 -childID 2 -isForBrowser -prefsHandle 3756 -prefMapHandle 3752 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afcf3c7a-ad57-4377-b400-14f5ac054ae5} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab
            3⤵
              PID:4348
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4624 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4424 -prefMapHandle 4432 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1793ec9-fa77-4470-a06f-d20f60157712} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" utility
              3⤵
              • Checks processor information in registry
              PID:1140
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 3 -isForBrowser -prefsHandle 5476 -prefMapHandle 5416 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4841f2a1-098e-4286-a7f8-32e2f2d43691} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab
              3⤵
                PID:3028
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5708 -childID 4 -isForBrowser -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {222aee39-5d79-4f00-82af-52b833651b9d} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab
                3⤵
                  PID:704
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5876 -childID 5 -isForBrowser -prefsHandle 5880 -prefMapHandle 5884 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b92d1885-125e-40f0-9828-c33e4eaa99e9} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab
                  3⤵
                    PID:4356
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6236 -childID 6 -isForBrowser -prefsHandle 6348 -prefMapHandle 6340 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {345138f5-d07d-42c5-98f5-5a503808d866} 4432 "\\.\pipe\gecko-crash-server-pipe.4432" tab
                    3⤵
                      PID:3612
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                  1⤵
                  • Enumerates system info in registry
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:4540
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff856c246f8,0x7ff856c24708,0x7ff856c24718
                    2⤵
                      PID:1600
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                      2⤵
                        PID:112
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2080
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
                        2⤵
                          PID:2140
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
                          2⤵
                            PID:1728
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                            2⤵
                              PID:2440
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:1
                              2⤵
                                PID:4968
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                                2⤵
                                  PID:5044
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:8
                                  2⤵
                                    PID:5016
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:32
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:1
                                    2⤵
                                      PID:4432
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:1
                                      2⤵
                                        PID:2652
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
                                        2⤵
                                          PID:5104
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                                          2⤵
                                            PID:2332
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                                            2⤵
                                              PID:3452
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                                              2⤵
                                                PID:2276
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                                                2⤵
                                                  PID:3996
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5668 /prefetch:8
                                                  2⤵
                                                    PID:3108
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                                                    2⤵
                                                      PID:1388
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:1
                                                      2⤵
                                                        PID:3724
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:1
                                                        2⤵
                                                          PID:1728
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1756 /prefetch:1
                                                          2⤵
                                                            PID:1224
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1936 /prefetch:8
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3068
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6140 /prefetch:2
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1872
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:1
                                                            2⤵
                                                              PID:4948
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5196 /prefetch:8
                                                              2⤵
                                                                PID:5504
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:1
                                                                2⤵
                                                                  PID:2700
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                                                  2⤵
                                                                    PID:912
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17239811502295091522,14888272682783412862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:1
                                                                    2⤵
                                                                      PID:3168
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:3628
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:3452
                                                                      • C:\Windows\System32\rundll32.exe
                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                        1⤵
                                                                          PID:2816
                                                                        • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe
                                                                          "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies registry class
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:468
                                                                        • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe
                                                                          "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies Internet Explorer settings
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:452
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 2204
                                                                            2⤵
                                                                            • Program crash
                                                                            PID:2920
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 452 -ip 452
                                                                          1⤵
                                                                            PID:2816
                                                                          • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe
                                                                            "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies Internet Explorer settings
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:344
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 2212
                                                                              2⤵
                                                                              • Program crash
                                                                              PID:1016
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 344 -ip 344
                                                                            1⤵
                                                                              PID:4760
                                                                            • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe
                                                                              "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies Internet Explorer settings
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4704
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 2220
                                                                                2⤵
                                                                                • Program crash
                                                                                PID:408
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4704 -ip 4704
                                                                              1⤵
                                                                                PID:2100
                                                                              • C:\Windows\system32\OpenWith.exe
                                                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                                                1⤵
                                                                                • Modifies registry class
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:3112
                                                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\WeAreDevs_API.dll"
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Checks processor information in registry
                                                                                  • Modifies Internet Explorer settings
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1456
                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1268
                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=61280AA94B38A1DAB3CFD5DA10108DD1 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1348
                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=81D3F29287E17D3DDBA341BC3FF06C9B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=81D3F29287E17D3DDBA341BC3FF06C9B --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:1
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3896
                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2ED596C913CF0EE3AB4A4A8E75EE448E --mojo-platform-channel-handle=1816 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2272
                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6DCD6627219E714A60C47C4E3F4FA7FD --mojo-platform-channel-handle=1832 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1136
                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A561F3D269B45B5230F26E91733074E4 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4904
                                                                              • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe
                                                                                "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies Internet Explorer settings
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4496
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 2208
                                                                                  2⤵
                                                                                  • Program crash
                                                                                  PID:1912
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4496 -ip 4496
                                                                                1⤵
                                                                                  PID:4424
                                                                                • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe
                                                                                  "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe"
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies Internet Explorer settings
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:4948
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 2208
                                                                                    2⤵
                                                                                    • Program crash
                                                                                    PID:1428
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4948 -ip 4948
                                                                                  1⤵
                                                                                    PID:4124
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault3f70fb5dhff11h4cb6hbd40hb2e2ebc7dea7
                                                                                    1⤵
                                                                                      PID:5288
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xf8,0x12c,0x7ff856c246f8,0x7ff856c24708,0x7ff856c24718
                                                                                        2⤵
                                                                                          PID:5308
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4498769390643219446,9961997065885026037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
                                                                                          2⤵
                                                                                            PID:5560
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4498769390643219446,9961997065885026037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                                                                                            2⤵
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:5568
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
                                                                                          1⤵
                                                                                            PID:5732
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulteebba9a8ha797h4b84hbdd0hd8c0ea75de1b
                                                                                            1⤵
                                                                                              PID:5908
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff856c246f8,0x7ff856c24708,0x7ff856c24718
                                                                                                2⤵
                                                                                                  PID:5920
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5895702705819063500,13154433543250784163,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                                                                                                  2⤵
                                                                                                    PID:3160
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5895702705819063500,13154433543250784163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:3
                                                                                                    2⤵
                                                                                                      PID:5020
                                                                                                  • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe
                                                                                                    "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\neobloxBootstrapper.exe"
                                                                                                    1⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Modifies registry class
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5576
                                                                                                  • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\lightweightNeoblox\lightweightNeoblox.exe
                                                                                                    "C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\lightweightNeoblox\lightweightNeoblox.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Modifies registry class
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2816
                                                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                                                    C:\Windows\system32\AUDIODG.EXE 0x490 0x44c
                                                                                                    1⤵
                                                                                                      PID:5956

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                                      Filesize

                                                                                                      56KB

                                                                                                      MD5

                                                                                                      752a1f26b18748311b691c7d8fc20633

                                                                                                      SHA1

                                                                                                      c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                                                                                                      SHA256

                                                                                                      111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                                                                                                      SHA512

                                                                                                      a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                                                                                                    • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                      MD5

                                                                                                      b21a160856e8baaa825094ced111631c

                                                                                                      SHA1

                                                                                                      a162e14683baaf1165de21b18864a8dd7a935923

                                                                                                      SHA256

                                                                                                      e77600ac63e9c6c0b1e472a9255e4c79fbba769659ae5dd7cf44faba6cbb431c

                                                                                                      SHA512

                                                                                                      d9405e905c733d2c56bf13177b231a567b79e9f765279bfedc63c5cce0ffa9b5d50ef1a200b61db8558a1b91820a2ab111e7fed92c7cf42bd3f1a08ab0cf0878

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      fab8d8d865e33fe195732aa7dcb91c30

                                                                                                      SHA1

                                                                                                      2637e832f38acc70af3e511f5eba80fbd7461f2c

                                                                                                      SHA256

                                                                                                      1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                                                                                      SHA512

                                                                                                      39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      bac895ef8f739f9bdc7086ca3436069a

                                                                                                      SHA1

                                                                                                      1d98efb51f620797ed51867a5d24689f16786f8c

                                                                                                      SHA256

                                                                                                      df7a25f79d99fdd9058741acd3a1c1f520e9cde9e5bb0a26aaa5f845e4f9a710

                                                                                                      SHA512

                                                                                                      22ee86acb8fd212e59c66ed5ece63245feddfd696ecc1355581cb3594e33a2edee08649f209d888db17f94439c658da851904d49409fd90496aa7e901135902d

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      36988ca14952e1848e81a959880ea217

                                                                                                      SHA1

                                                                                                      a0482ef725657760502c2d1a5abe0bb37aebaadb

                                                                                                      SHA256

                                                                                                      d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                                                                                      SHA512

                                                                                                      d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                      Filesize

                                                                                                      62KB

                                                                                                      MD5

                                                                                                      c813a1b87f1651d642cdcad5fca7a7d8

                                                                                                      SHA1

                                                                                                      0e6628997674a7dfbeb321b59a6e829d0c2f4478

                                                                                                      SHA256

                                                                                                      df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3

                                                                                                      SHA512

                                                                                                      af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                      Filesize

                                                                                                      67KB

                                                                                                      MD5

                                                                                                      b275fa8d2d2d768231289d114f48e35f

                                                                                                      SHA1

                                                                                                      bb96003ff86bd9dedbd2976b1916d87ac6402073

                                                                                                      SHA256

                                                                                                      1b36ed5c122ad5b79b8cc8455e434ce481e2c0faab6a82726910e60807f178a1

                                                                                                      SHA512

                                                                                                      d28918346e3fda06cd1e1c5c43d81805b66188a83e8ffcab7c8b19fe695c9ca5e05c7b9808599966df3c4cd81e73728189a131789c94df93c5b2500ce8ec8811

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                      Filesize

                                                                                                      19KB

                                                                                                      MD5

                                                                                                      1bd4ae71ef8e69ad4b5ffd8dc7d2dcb5

                                                                                                      SHA1

                                                                                                      6dd8803e59949c985d6a9df2f26c833041a5178c

                                                                                                      SHA256

                                                                                                      af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725

                                                                                                      SHA512

                                                                                                      b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                      Filesize

                                                                                                      63KB

                                                                                                      MD5

                                                                                                      226541550a51911c375216f718493f65

                                                                                                      SHA1

                                                                                                      f6e608468401f9384cabdef45ca19e2afacc84bd

                                                                                                      SHA256

                                                                                                      caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5

                                                                                                      SHA512

                                                                                                      2947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      4f21141d1296b9358fb856eed2221972

                                                                                                      SHA1

                                                                                                      122a297665e8ddbfb530d5dc3f0e086867494ae2

                                                                                                      SHA256

                                                                                                      4bed0475f066e17f9e0694b6f07d546a1ffe12ef310ffb63da44e3a5d27b03a1

                                                                                                      SHA512

                                                                                                      5b8f119612f83c5f38483c62ec85d7c9fe663d6f0e7adcf126a96f1422858c2af0e80d7b826bdc82fb2052ef29a95309ca21734147234f33dbd902151ca450e4

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      9377b0cbb1fd356dfca27e8bd655bdb5

                                                                                                      SHA1

                                                                                                      d58165d8ae4ea45ceeef72794287ce37bd9d84f7

                                                                                                      SHA256

                                                                                                      f5244e37985e855e50dad500005447e5563e44df3140ae139a791a39a29a14ca

                                                                                                      SHA512

                                                                                                      fa405edd2b3743aff9880d039432fadfd5a84aec5f6a9f4f4862ec429633808f26913226dbb516368e12d8318979519e614d550bb98e22f663a624f622b74335

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      1204f75b573e61e51c127d77b7f14472

                                                                                                      SHA1

                                                                                                      4dc1c8284b2067efacad5b1f0f51a9042c8db102

                                                                                                      SHA256

                                                                                                      d86ce5e9c204e511e7624ca7540f968c57aace32bdddba1fa2dfc8495d6431b0

                                                                                                      SHA512

                                                                                                      1ae45c930aef6c5bc42a4024e1fd10e5da65d465bfcda8ed7c96ee32f77bc158008bbf940a9a639cbe54daf0f1e42061c3fe68bd1c916c6288a33848d28b6b20

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      0942d46f5e173fd709aa1053eed02558

                                                                                                      SHA1

                                                                                                      b3a3402c76ebb58dafb2015f92204d2382ae6501

                                                                                                      SHA256

                                                                                                      c042ea836262fe9eb03aa27c7293d0df46d2919648f0dfe93971a104600930d3

                                                                                                      SHA512

                                                                                                      55415194bc1be22923900388eac61d78b1d50be7da1733f7bb1892df72c79b004c5cb0f6eaae45b095fcad9672090c44eaa98c87be3a7c8cc1163d257faf7a19

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      42ac0cc417454a268538522214caccb6

                                                                                                      SHA1

                                                                                                      53e30331999d8ab6a818289b2d1951aea9d9c335

                                                                                                      SHA256

                                                                                                      93b3cee6a3ae42b673d1a4a6c14733506f51ae2e1e24a14350da3f0a8d4f2efc

                                                                                                      SHA512

                                                                                                      d8735045156d0d39cf0aedc1e5bc733e1eda538c4301b1523497d4b32085f26c864435f8540dc10656c5bd50c108f308861cd85a9011b3eeac7cf84a428e4540

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      902e51b656d81a831d3e4ffc83deca9a

                                                                                                      SHA1

                                                                                                      8fa774f2feed89f87946300d4c568160254f249a

                                                                                                      SHA256

                                                                                                      4b8e1a6eec97c378f774a8981f84ee46aa7e62c1548fe9f858f5269a594c2eed

                                                                                                      SHA512

                                                                                                      df68fd14725a319f9ed4efb70ffec00beb7be5a169e62ad09877466f8f6bc81f1e3518f786939c413532ee242171c2d4b2c0cc77ac308161d1b1a31b1569de1b

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      5KB

                                                                                                      MD5

                                                                                                      2ecc783473a0de25e01a046742992f1e

                                                                                                      SHA1

                                                                                                      fedc4e6ec45865c863df1118bda30de6ed183489

                                                                                                      SHA256

                                                                                                      73a2dc05b761173d4174d7f6c16c691d20c8ee747809c3f653b03fcb87897d0d

                                                                                                      SHA512

                                                                                                      f99a66c249f58c4093e6259c46b940bd30a979ad687e011e5eb94c5f683068941ceff43dbb3f684fe0b802f56541d7f7d90fff2c0eafb5a96084a8c5a6577678

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      55498c10643d05f487faa425bba032cb

                                                                                                      SHA1

                                                                                                      370fdcdcdc36264978d52bdf7011d09beedf66a0

                                                                                                      SHA256

                                                                                                      989352f62ff7fb6bc16755e0dfd5bb32df27afcb3fd975e82667de65733e6fe5

                                                                                                      SHA512

                                                                                                      2ae2285e3e85afcaddfa442d7c9ddf9980562dc4bb5beeed9338a787f1441455104a7f69a3587fba268b39e0599fe3bd6e035b436ff78fbf64235c83e8cf5ac8

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      7a5a54c654dae75b7259adc8bd0d983b

                                                                                                      SHA1

                                                                                                      f6828047b1c3f6ef065a045d255c183b8e5e5195

                                                                                                      SHA256

                                                                                                      5348169d6ae5304e46b61c65e79b503ec13e8c8738da3c24d3c1eb8b914160b4

                                                                                                      SHA512

                                                                                                      4a7ad90b3e68a38c86f4d113a85490be1be8e02ab2f0bcf6aaa36cf013eefdd0a071b9e41cd885cd2a86511e3adb24bed7842cccf66cb110a91f72cae7b3ef2b

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      46491f9fad2b1e0cb320591ab6fc59c9

                                                                                                      SHA1

                                                                                                      5449e3c61d5881cb81ea6b08fe563dd6bab40768

                                                                                                      SHA256

                                                                                                      9488b319f9ad392216377346f36f6c084f5d65db6468e855f23b20e4615b0414

                                                                                                      SHA512

                                                                                                      562af5279a1835d2028cf1facf660f17da9bad2c401e738c808bdd9ba9df76eb8f520cdd509665b61f17f2c0058a4714256b735d60efd27cf1250221b545af0c

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      bad14326c785fac5007490578848ff33

                                                                                                      SHA1

                                                                                                      d27735c5b124b6739d522020bdb2a647afb01154

                                                                                                      SHA256

                                                                                                      4431292b7b7b14ff9eba5c094908447151eebba7180124210e51a09e35acce64

                                                                                                      SHA512

                                                                                                      d48c4af71e4266262b3f6abfc6ddb1a53d18acdd5d541d126e6da244fa6b83aa926aedc8210a206938e8a466546376cd0ac070ce63df9279a387048cbdfa86b6

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      8b82b498c177420f4ff4ac4fca73d584

                                                                                                      SHA1

                                                                                                      1617cb73f9dae5470029334c1e4e2f73ad643f95

                                                                                                      SHA256

                                                                                                      e280780096370b9036fe3897dfeacd1f7123f7e1f5d08aa72c0db75e314a6edb

                                                                                                      SHA512

                                                                                                      c867e78e15708797b09c79df68dc005342b8fbe40e3d385ca107ee50024f89127dc7dc74ea7bb05fab94c12fe33ea323537845dfc15cfd7ff46e02dadb5fc5a9

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      a93ac793eefc37b7c6b01f3857e14bae

                                                                                                      SHA1

                                                                                                      c2e4f33334ece78a9df7b533ccf21ced39685788

                                                                                                      SHA256

                                                                                                      9a153bbd554288b3018725fb413516581be36d69c662e7f11dfe959973adfb2c

                                                                                                      SHA512

                                                                                                      571f0683f813dd14157155d9c064dabb96eb4486a3edc9f3c574f41fb898b8713792df5cf877e2bee7467cda6a98e4fa4415392043f94e91f9e2e922c4fd4beb

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      29725b230a9487997939b90a75915545

                                                                                                      SHA1

                                                                                                      c12acbf49bd8712c1658cdca9d34ee73f25339c9

                                                                                                      SHA256

                                                                                                      f55d9a1ea7bd410f9f0eb1ad03affec98e739f7bb196e18f4acd91a1f2b4af04

                                                                                                      SHA512

                                                                                                      7a23c5100c4933302300a1833984b84d52f490826f3bc68ea39f13b7b465e95b7653a319e29bf41c94edded1860f3c6ac67527d60cafc3d575204cea6a851342

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      d2dd1e3faa32a4e8f391ce439ff9cef8

                                                                                                      SHA1

                                                                                                      99b74d06e6fc3b51f26a8bd1d3eab2393f391c5b

                                                                                                      SHA256

                                                                                                      de1f6d0fda4434baec23f1220455069a352e89f02ca9ab55e13dcb0765e400cc

                                                                                                      SHA512

                                                                                                      6348e6b895a2318c6b103cf75e4b959233f7c1d175809bcbfd52055103175776c9c51b5a491e8efe0b94fce8035964afb701ae5dc61b9d30812d8c31caa5a5be

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5891bc.TMP

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      8e7b4a828fbdfb7ac7fc9bb32a5d41d5

                                                                                                      SHA1

                                                                                                      814b8af5f64d791f439e1dccc92f4faec3ae7f2c

                                                                                                      SHA256

                                                                                                      1716e56b5f92f66f98c23a4546655137032a12350a52b3156dc5ffcb94628d00

                                                                                                      SHA512

                                                                                                      ccddd34c870cc27379a5cd7348fcc1abef859b41a26b3994afd6e1a0621e749f955ac30b866ddfa957a8b9a43f9bb8f86326a89f5d34c276ee6d7ea09f44c177

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                                                      SHA1

                                                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                      SHA256

                                                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                      SHA512

                                                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      10KB

                                                                                                      MD5

                                                                                                      00fdf56fb2aabd5ff957ae35d5ef5f7b

                                                                                                      SHA1

                                                                                                      84f0e90cab9f6cd115ca99b2c94f400eea9054f6

                                                                                                      SHA256

                                                                                                      077446dd1877b22f6c8b5f3f8a2ed0f3936881a77183ce2480550abc83c59172

                                                                                                      SHA512

                                                                                                      93046d49e80fb8d7b24f2306929e9c69fd56831ca27c03ecf8bfa4cf7c37f18702791325b5c1f393b8ae37817a6fb6d8a6710971083fe2129abb4d2b787cc5b4

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      10KB

                                                                                                      MD5

                                                                                                      ca5632147df1a0cc0a82489fe3eeb824

                                                                                                      SHA1

                                                                                                      622393553cb929f31008e422656ae8307d2bb1d5

                                                                                                      SHA256

                                                                                                      1b87876dcef144ae945d4ebc5097a9037878165d433d66f9f92bf3323b9d0537

                                                                                                      SHA512

                                                                                                      bfd19fd6b442a3fd0548fe249e69c7c600971fab16df730e309482c300bdfc7ac883c62d5c28ed869426718db8a0646f2a43bbbe6a03011a429a56dfc10c0921

                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                                                                                                      Filesize

                                                                                                      27KB

                                                                                                      MD5

                                                                                                      532bbe90af0ab446c5fee688dc9ec3f2

                                                                                                      SHA1

                                                                                                      728ac4c9ae2426d93850a08646ab0fa35fd04a2a

                                                                                                      SHA256

                                                                                                      585b0baf4896d526b21776c3a315571c7092526ecb62cfa84f203c3506630cb5

                                                                                                      SHA512

                                                                                                      55464374b3eaee93905a44f1921976b50c4b147056b53e4dacbbf9b6f7edcab4b75b20cfc56e6e584a2ffc81496c691b5b3fbecc52e2acb21b98e4142804fb55

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      acc126cd4d1b34fb248611d39bc815be

                                                                                                      SHA1

                                                                                                      904ade0996cd02988b0c52afc1c1dbd89051cc25

                                                                                                      SHA256

                                                                                                      5a292dcfcbe466a903dabbc38982a1ca82f6102525f4fe3e1b8d6dcbed9c2729

                                                                                                      SHA512

                                                                                                      0b73c1003dd84b85387b8bd0b6ffc3295d3308fc441baedfd5901ce87b25bfcc41d5edc9c486660c42f6655eae7b0c6cd1222ea683f2767338127f7760c686d8

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      3882da304885ac8b57e3d90dc3e3d067

                                                                                                      SHA1

                                                                                                      4583991da4c6602ec3f1e077722325449dbe8a8d

                                                                                                      SHA256

                                                                                                      a5fec54b44f0c74129e5f66d54fce4a2d57432e99363fb96069bbff63493efbc

                                                                                                      SHA512

                                                                                                      8e962fe7d5a59f2bad8e7f8a0a1c61f7e3ca2ead47e3d069866cb1772af9fe60176bc51760c3a57a3cbce0f04ede78905314fdcf17b18a7c1b3d92a6ce83d7d7

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                      Filesize

                                                                                                      22KB

                                                                                                      MD5

                                                                                                      c2925264e041a23fed76faa12ebf5957

                                                                                                      SHA1

                                                                                                      8d7221eb3d16c1fbe3eed5a5ef73926a392e259c

                                                                                                      SHA256

                                                                                                      853594ec1d8fcd9a466ed0a4a2a2bbae72078a6daf4ce595aafe2cd26a56386c

                                                                                                      SHA512

                                                                                                      ef68b28ec28b39ffcc715906b87378af8a2cc0fb850788190176ab8df369762eb70ef1370b33c533411e7d891b4652ac79707616a9b651ec28479f09c1d55ba0

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                      Filesize

                                                                                                      23KB

                                                                                                      MD5

                                                                                                      dea01a0e43a7f8cb0428a42d2b4ede4d

                                                                                                      SHA1

                                                                                                      8ed5c1d94e9624dea20a8faafea8d25fd45de5b7

                                                                                                      SHA256

                                                                                                      f52e3a0b561994624d50031a6030777952735b304d04be3c65ec07b44324e7fb

                                                                                                      SHA512

                                                                                                      638e16cbbe43f93f973b2e678c7a9970e2d021cab5ce7da8c2d27ca03aab651942da6809ff75768aec97a7a0063480d1f7a3a7356792474eb5d292a19c5fa3dd

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                      Filesize

                                                                                                      22KB

                                                                                                      MD5

                                                                                                      c3d625cb00a9987c65ac9500c523d96e

                                                                                                      SHA1

                                                                                                      236a6c6f8071e74e8ec7880bb26a9600aa724bce

                                                                                                      SHA256

                                                                                                      09837f0e2303b965571d12e2f9c40182c516e46af084748e3dc5678e787614b4

                                                                                                      SHA512

                                                                                                      fd651160d63546cb19e72563f81253aa00c27f65d791c4c222aa887ff2c294df47eb89d37f5fdfcee27eb6bf40b0b68df7f2dbe64f6b715832a5f74d453897e3

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\55d68b40-2840-41e9-b6a2-b38db238b75a

                                                                                                      Filesize

                                                                                                      659B

                                                                                                      MD5

                                                                                                      2a79a39c7fdb843e2e57c4f601918e95

                                                                                                      SHA1

                                                                                                      95c43ac3928367d5b5dfbc26abd462968d199ad9

                                                                                                      SHA256

                                                                                                      ffab320a938265dd829b7b544bd9e32fe8192f4de1c431fb591ad254eea6b36a

                                                                                                      SHA512

                                                                                                      96530bcecde656000fdc184bfff0d4d824c32532ade254fb4611c610f805bb252002be41643fd0b3465a4b94a3445fa548706ef0c1314d4eb2a12f572fdc50bb

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\be6480d1-9b4d-4544-8d43-168bf92f1813

                                                                                                      Filesize

                                                                                                      982B

                                                                                                      MD5

                                                                                                      69ef4a10a5fdf4ef367c43e25508cb1e

                                                                                                      SHA1

                                                                                                      ea620776e1f2aaaeaf51cd7afd5eff01d8440a73

                                                                                                      SHA256

                                                                                                      183cb8c09970ec6179d2a1bf89ffcabd942180e8f35afc90d07f11906beb84d7

                                                                                                      SHA512

                                                                                                      1f3d70731bdc142061e89bf3ea250ccc34313f3190de0fc777d035e2b6c6f6ca4f0a0d3b613f4679a1feb6d5729f249382ed97270ff27611a44e8c4b6b50bfac

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                                                                                      Filesize

                                                                                                      10KB

                                                                                                      MD5

                                                                                                      103e181fe257264c73fe229eec636971

                                                                                                      SHA1

                                                                                                      6ac2c1136f824dae177663c187b19591efdc09bc

                                                                                                      SHA256

                                                                                                      1834f2fecb364318d776ab32c9679ae444798f002e79a4a703bca10b7b866aed

                                                                                                      SHA512

                                                                                                      7e2d97c7869466c2e5e79d3e2225b5923b26941beecc56ba77fe533f78e391c51b63a9f38a4dfbc87150844442fbbda09151302f72ecfe77386f208ef25ac3dc

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                                                                                      Filesize

                                                                                                      10KB

                                                                                                      MD5

                                                                                                      1d51deebf6935dd0127b8ed0a11bc1be

                                                                                                      SHA1

                                                                                                      59709b2367a93075e01fb709a3d9a23f6447c7d2

                                                                                                      SHA256

                                                                                                      5a986e620bb60cf037f044e2a522ae9752333dff74fddfa825cfd7444f2515cb

                                                                                                      SHA512

                                                                                                      7fe0e0da8ce0771f2c818dc145b49c89cbbc1ba985965e357c9c4e7c6b631b2cf84d622f38d5ae9f7226ba3fd6377cad0c91637528dcb2ac19a8feaadb27d80c

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                      Filesize

                                                                                                      368KB

                                                                                                      MD5

                                                                                                      7aa16d4ca07a987b9d3d7643f699f31f

                                                                                                      SHA1

                                                                                                      cb27eb1c90e94565d835ead380476cdb9631bde4

                                                                                                      SHA256

                                                                                                      f960390742d2f35627722ed7c03ee308de9bcc74f19e05a1520230e5798a398b

                                                                                                      SHA512

                                                                                                      54685a5282fa8fec9ba08bfac71e445d9c66dcf1688ce09d6344905d66ee840f0d4ef94fc4991f4d45cbc249fb543432bf5fc6f8f7dbec6c2a9726c10b12d4e6

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\EasyExploits.dll

                                                                                                      Filesize

                                                                                                      10KB

                                                                                                      MD5

                                                                                                      1c5ffe214040f00ec898bd3c5110e8b2

                                                                                                      SHA1

                                                                                                      4abfbf2bcbcb742b4c4bbb11d21cafeeb93cf8bb

                                                                                                      SHA256

                                                                                                      23312041ffa8628a7f89a21ba72af853cb90f26cf134d456656276930b26c1ec

                                                                                                      SHA512

                                                                                                      682e5c06b1d26bee3f8d5cab9ff9c70908906c20b28ad7e022c37ce3b62b9af5cb1bf39734f387353566b45f5cf9f7c879c3d0a32c894168e6fe64ce7b80bd36

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\KrnlAPI.dll

                                                                                                      Filesize

                                                                                                      1.2MB

                                                                                                      MD5

                                                                                                      457242aba102f82daedb7ec907b1ac5c

                                                                                                      SHA1

                                                                                                      bb20ca697349a16fc80c928aea8d155c1cb4fa40

                                                                                                      SHA256

                                                                                                      3667300295731be993d6a2d6a21e23e8be9fb177a8b3325f55db28fd265fc19a

                                                                                                      SHA512

                                                                                                      23f8bd7cad2e8530dae8f14e620343658cf07ecfae71d223666166228e2d223abc5e981c26eb78ed4c4737c74284737a854c8e7e7cf06441244cbcfc9c6acd1b

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\Monaco.html

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      08b6930cde9eb303d1dd59b311587072

                                                                                                      SHA1

                                                                                                      9f8b237181c918f7c3b660b0b57d915253243307

                                                                                                      SHA256

                                                                                                      eaab49b697c5993346036e9a2ff404587d76d7bc548e6cee65fc7b23688e9672

                                                                                                      SHA512

                                                                                                      178ceeb9c0babf5208d86c339ffa6da7521afa28244505b0fada8a649672c0bba256fb1833ef353f187fa5bc0b8ff2c389bc4a8811eac16330c98d583f375337

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\editor\editor.main.css

                                                                                                      Filesize

                                                                                                      171KB

                                                                                                      MD5

                                                                                                      233217455a3ef3604bf4942024b94f98

                                                                                                      SHA1

                                                                                                      95cd3ce46f4ca65708ec25d59dddbfa3fc44e143

                                                                                                      SHA256

                                                                                                      2ec118616a1370e7c37342da85834ca1819400c28f83abfcbbb1ef50b51f7701

                                                                                                      SHA512

                                                                                                      6f4cb7b88673666b7dc1beab3ec2aec4d7d353e6da9f6f14ed2fee8848c7da34ee5060d9eb34ecbb5db71b5b98e3f8582c09ef3efe4f2d9d3135dea87d497455

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\editor\editor.main.js

                                                                                                      Filesize

                                                                                                      2.0MB

                                                                                                      MD5

                                                                                                      9399a8eaa741d04b0ae6566a5ebb8106

                                                                                                      SHA1

                                                                                                      5646a9d35b773d784ad914417ed861c5cba45e31

                                                                                                      SHA256

                                                                                                      93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

                                                                                                      SHA512

                                                                                                      d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\editor\editor.main.nls.js

                                                                                                      Filesize

                                                                                                      31KB

                                                                                                      MD5

                                                                                                      74dd2381ddbb5af80ce28aefed3068fc

                                                                                                      SHA1

                                                                                                      0996dc91842ab20387e08a46f3807a3f77958902

                                                                                                      SHA256

                                                                                                      fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

                                                                                                      SHA512

                                                                                                      8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Monaco\vs\loader.js

                                                                                                      Filesize

                                                                                                      27KB

                                                                                                      MD5

                                                                                                      8a3086f6c6298f986bda09080dd003b1

                                                                                                      SHA1

                                                                                                      8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

                                                                                                      SHA256

                                                                                                      0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

                                                                                                      SHA512

                                                                                                      9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe

                                                                                                      Filesize

                                                                                                      976KB

                                                                                                      MD5

                                                                                                      60bdad498581b4998ad0397465d30891

                                                                                                      SHA1

                                                                                                      a57494c1f958dce86707187d8dfe17ae5c6028b7

                                                                                                      SHA256

                                                                                                      27ea6419a7bedd7b748b67f7b436d7beff65dcc149ac942b9d840f096fae7355

                                                                                                      SHA512

                                                                                                      c48bdb6b0cd6c66512f7204ef44b54f6a2a3d57b2586f95cab88288a6da620b060bff8ede38dd9352422ad6b926a2f0ceca76da1bc3df2de3c0867797e665396

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Neoblox.exe.config

                                                                                                      Filesize

                                                                                                      530B

                                                                                                      MD5

                                                                                                      c7a4606f8f222fc96e1e6b08c093794b

                                                                                                      SHA1

                                                                                                      2700b3727ab01d93e75e1e12f308dcaeb1d37dba

                                                                                                      SHA256

                                                                                                      32d656a69b19be98ae050512a4d0f49ebe21b6f7bb9c50130b7e952ea4f5239b

                                                                                                      SHA512

                                                                                                      7516375b47536a51ede8079d25760e0142ac93077326b6cc033fd6cb1676b65aec7edb3f702922506f2b6b18992cd219be01e7adbf70c6d13404adceb410472b

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\Siticone.UI.dll

                                                                                                      Filesize

                                                                                                      771KB

                                                                                                      MD5

                                                                                                      fa842ffa299c794e57597aae857d9cb3

                                                                                                      SHA1

                                                                                                      154afdfd9bd80c1b512f516a8c187c6dd849161e

                                                                                                      SHA256

                                                                                                      b1d4cdc7891d51636c5e82a91b9bf20e6bb6e68ddf515ac6f51fbda7b199d07d

                                                                                                      SHA512

                                                                                                      04ee2bff2a9ff0cf89150bb73f0f6a0bda372a245f12c5772b7167821f54f3d1d43292e3ce3c9f2eca2202688c179d5f09248c0fe522bf028c221e07b2d34e4a

                                                                                                    • C:\Users\Admin\Downloads\Neoblox_Bootstrapper\Neoblox_Bootstrapper\Neoblox\WeAreDevs_API.dll

                                                                                                      Filesize

                                                                                                      605KB

                                                                                                      MD5

                                                                                                      f263efb1b579cc33a0f1024c2a18d03b

                                                                                                      SHA1

                                                                                                      e9dc916b6d4606ba47e30787387dcfd490bafc56

                                                                                                      SHA256

                                                                                                      f2732f9e3a87d874a3108f8ff0be200bcab9d07fe77b02aaacd94da1efcb3963

                                                                                                      SHA512

                                                                                                      09a3d948b52b16136f2ce9ecdb094a99092a4a9cf6f324e67a0a5d04d244cf4c3fd2696010f1884272240c3bc24fdaf1edc9ac102bc438564e7fc0be7b2fca34

                                                                                                    • memory/452-947-0x0000000005880000-0x00000000059BE000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.2MB

                                                                                                    • memory/452-951-0x0000000004C40000-0x0000000004C48000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/452-943-0x0000000004D20000-0x0000000004DBE000-memory.dmp

                                                                                                      Filesize

                                                                                                      632KB

                                                                                                    • memory/452-955-0x0000000005A90000-0x0000000005B58000-memory.dmp

                                                                                                      Filesize

                                                                                                      800KB

                                                                                                    • memory/452-939-0x00000000002A0000-0x000000000039A000-memory.dmp

                                                                                                      Filesize

                                                                                                      1000KB

                                                                                                    • memory/468-848-0x00000000056C0000-0x00000000056D2000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/468-837-0x0000000000D90000-0x0000000000D9A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/468-836-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                                      Filesize

                                                                                                      344KB

                                                                                                    • memory/1364-16-0x0000000001860000-0x0000000001BAA000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/1364-13-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                      Filesize

                                                                                                      188KB

                                                                                                    • memory/2816-1231-0x00000000003D0000-0x0000000000478000-memory.dmp

                                                                                                      Filesize

                                                                                                      672KB

                                                                                                    • memory/2816-1232-0x0000000005E60000-0x0000000005FB4000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.3MB

                                                                                                    • memory/4264-9-0x0000000006460000-0x00000000064FC000-memory.dmp

                                                                                                      Filesize

                                                                                                      624KB

                                                                                                    • memory/4264-10-0x0000000006600000-0x0000000006666000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/4264-15-0x0000000074CB0000-0x0000000075460000-memory.dmp

                                                                                                      Filesize

                                                                                                      7.7MB

                                                                                                    • memory/4264-0-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/4264-8-0x0000000006330000-0x00000000063C4000-memory.dmp

                                                                                                      Filesize

                                                                                                      592KB

                                                                                                    • memory/4264-7-0x0000000006240000-0x000000000625E000-memory.dmp

                                                                                                      Filesize

                                                                                                      120KB

                                                                                                    • memory/4264-6-0x0000000004D80000-0x0000000004D8A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/4264-5-0x0000000074CB0000-0x0000000075460000-memory.dmp

                                                                                                      Filesize

                                                                                                      7.7MB

                                                                                                    • memory/4264-4-0x0000000004D00000-0x0000000004D76000-memory.dmp

                                                                                                      Filesize

                                                                                                      472KB

                                                                                                    • memory/4264-3-0x0000000004C60000-0x0000000004CF2000-memory.dmp

                                                                                                      Filesize

                                                                                                      584KB

                                                                                                    • memory/4264-2-0x0000000005130000-0x00000000056D4000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.6MB

                                                                                                    • memory/4264-1-0x0000000000260000-0x000000000026A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB