Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 10:02

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    419409ac948f88109df5953921297526

  • SHA1

    742671ca1a33cc6471198796f4b2d105f935dbe0

  • SHA256

    a02c34fe8af96d774e11aff52237a194fdb446eba979e5c2d26e3776b0bfb6d5

  • SHA512

    8efdd977dd3a6ea1eab7c504802e26ac95fe8db8cc132c92a04501b72f2ff7b308dd18c25000e983e7f816e53bab103e89fa6ac644b1f058b8736421cd7eb394

  • SSDEEP

    49152:HscjhlXg71UTTcNaoE5rBSOiZXy8LCNQPVDheI+Uz:HxjjcOcgoEzSxZXnL7KI+Uz

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 18 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 16 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe
        "C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff88815cc40,0x7ff88815cc4c,0x7ff88815cc58
            5⤵
              PID:4852
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:2
              5⤵
                PID:4824
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2084 /prefetch:3
                5⤵
                  PID:2820
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:8
                  5⤵
                    PID:2732
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1480
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3628
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:448
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:8
                    5⤵
                      PID:876
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,1007701391948986987,7963565542096936351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4940 /prefetch:8
                      5⤵
                        PID:4980
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      PID:1756
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8881646f8,0x7ff888164708,0x7ff888164718
                        5⤵
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2364
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
                        5⤵
                          PID:4028
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1692
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
                          5⤵
                            PID:3800
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:2968
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:2824
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1700
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2184,13439916581125106435,16511040527867130332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1704
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BAFCGIJDAFBK" & exit
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:6008
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 10
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:6072
                      • C:\Users\Admin\AppData\Local\Temp\1010209001\caab8b0ee2.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010209001\caab8b0ee2.exe"
                        3⤵
                        • Enumerates VirtualBox registry keys
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3980
                      • C:\Users\Admin\AppData\Local\Temp\1010210001\39c8bb5ec9.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010210001\39c8bb5ec9.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1952
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1640
                          4⤵
                          • Program crash
                          PID:5140
                      • C:\Users\Admin\AppData\Local\Temp\1010211001\a5ae839562.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010211001\a5ae839562.exe"
                        3⤵
                        • Enumerates VirtualBox registry keys
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3172
                      • C:\Users\Admin\AppData\Local\Temp\1010212001\5ddbe7471e.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010212001\5ddbe7471e.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3180
                      • C:\Users\Admin\AppData\Local\Temp\1010213001\ad9e1ecec0.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010213001\ad9e1ecec0.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Loads dropped DLL
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2312
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                          4⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:2788
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff88815cc40,0x7ff88815cc4c,0x7ff88815cc58
                            5⤵
                              PID:2204
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1692,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:2
                              5⤵
                                PID:2396
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:3
                                5⤵
                                  PID:3800
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2488 /prefetch:8
                                  5⤵
                                    PID:2064
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:3736
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:1628
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3676,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3680 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:3480
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4764,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:8
                                    5⤵
                                      PID:2244
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,9032190744008339012,3091156118525953604,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:8
                                      5⤵
                                        PID:3140
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                      4⤵
                                      • Uses browser remote debugging
                                      • Enumerates system info in registry
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      PID:5928
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff884af46f8,0x7ff884af4708,0x7ff884af4718
                                        5⤵
                                        • Checks processor information in registry
                                        • Enumerates system info in registry
                                        PID:5244
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 /prefetch:2
                                        5⤵
                                          PID:4256
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:1
                                          5⤵
                                          • Uses browser remote debugging
                                          PID:4796
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:1
                                          5⤵
                                          • Uses browser remote debugging
                                          PID:3768
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2908 /prefetch:3
                                          5⤵
                                            PID:3540
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
                                            5⤵
                                              PID:232
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2712 /prefetch:2
                                              5⤵
                                                PID:5096
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:4676
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:2376
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:2
                                                5⤵
                                                  PID:5776
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3696 /prefetch:2
                                                  5⤵
                                                    PID:3908
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3704 /prefetch:2
                                                    5⤵
                                                      PID:4500
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4884 /prefetch:2
                                                      5⤵
                                                        PID:4920
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2620,10712281139485924890,13002328273470537855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2712 /prefetch:2
                                                        5⤵
                                                          PID:2232
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\DGIJDAFCFH.exe"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3216
                                                        • C:\Users\Admin\Documents\DGIJDAFCFH.exe
                                                          "C:\Users\Admin\Documents\DGIJDAFCFH.exe"
                                                          5⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1964
                                                    • C:\Users\Admin\AppData\Local\Temp\1010214001\e592570745.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1010214001\e592570745.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:4280
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM firefox.exe /T
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1828
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM chrome.exe /T
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1480
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM msedge.exe /T
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4744
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM opera.exe /T
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3108
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM brave.exe /T
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3764
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                        4⤵
                                                          PID:1396
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                            5⤵
                                                            • Checks processor information in registry
                                                            • Modifies registry class
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of SendNotifyMessage
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1692
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e92b629-9f6a-435c-8365-9422acaae06a} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" gpu
                                                              6⤵
                                                                PID:4356
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3556f68f-818c-4309-a850-68fed2b031bf} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" socket
                                                                6⤵
                                                                  PID:5112
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3164 -childID 1 -isForBrowser -prefsHandle 3200 -prefMapHandle 2992 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28aa4a6c-95ec-4716-9d83-0dedb361f5a4} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" tab
                                                                  6⤵
                                                                    PID:4860
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3908 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab6365cf-c9be-479d-83fa-094b2cfa3a48} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" tab
                                                                    6⤵
                                                                      PID:4912
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4616 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4608 -prefMapHandle 4600 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6840f633-112b-463f-a65d-1a36442a17bf} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" utility
                                                                      6⤵
                                                                      • Checks processor information in registry
                                                                      PID:5760
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5344 -childID 3 -isForBrowser -prefsHandle 5340 -prefMapHandle 5336 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {707c9eab-6e9b-4373-a3f2-dc71b6ef3540} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" tab
                                                                      6⤵
                                                                        PID:5192
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5508 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61632ea6-bf48-4207-9574-b633b8f7c590} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" tab
                                                                        6⤵
                                                                          PID:5184
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5764 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8213d9ae-4c62-4dbd-8d52-8fb7152169a0} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" tab
                                                                          6⤵
                                                                            PID:5160
                                                                    • C:\Users\Admin\AppData\Local\Temp\1010215001\40a37c3682.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\1010215001\40a37c3682.exe"
                                                                      3⤵
                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Windows security modification
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:5440
                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                  1⤵
                                                                    PID:532
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                    1⤵
                                                                      PID:3576
                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                      1⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:2964
                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                      1⤵
                                                                        PID:4392
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1952 -ip 1952
                                                                        1⤵
                                                                          PID:5776
                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                          1⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          PID:5308

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\ProgramData\CBGCBGCA

                                                                          Filesize

                                                                          116KB

                                                                          MD5

                                                                          f70aa3fa04f0536280f872ad17973c3d

                                                                          SHA1

                                                                          50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                          SHA256

                                                                          8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                          SHA512

                                                                          30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                        • C:\ProgramData\DHDAFBFCFHIDAKFIIEBAAEHIJD

                                                                          Filesize

                                                                          96KB

                                                                          MD5

                                                                          40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                          SHA1

                                                                          d6582ba879235049134fa9a351ca8f0f785d8835

                                                                          SHA256

                                                                          cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                          SHA512

                                                                          cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                        • C:\ProgramData\IDHIEGIIIECAKEBFBAAE

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          64ee057873325d87b4d66a11ff4425ae

                                                                          SHA1

                                                                          fee6fc23a1f8b82958a6381fdd823ab99dad750d

                                                                          SHA256

                                                                          a6b9d050d03fb2f8239f3dbc8d86a5ad5f056366449f48256aeab40262f168a5

                                                                          SHA512

                                                                          a23bd13cf314056118ebc44b4b24c1c3bcd941c842fa70cdcfbc7bde5811bb617c6e24c8a94fab75bd39e514e9acad21c0569ee606a9000601cf984a7f9e5eea

                                                                        • C:\ProgramData\KECBKKEB

                                                                          Filesize

                                                                          114KB

                                                                          MD5

                                                                          eb8c6139f83c330881b13ec4460d5a39

                                                                          SHA1

                                                                          837283823a7e4e107ca7e39b1e7c3801841b1ef8

                                                                          SHA256

                                                                          489d5195735786050c4115677c5856e3ce72c3ecf2574be55021ad3d71caf40e

                                                                          SHA512

                                                                          88411dca362f0d9da0c093e60bf2b083340d0682b5ac91f25c78ac419cec1e325d0a5a0f96fd447d3d3806813cad7f1ca8cf9c423061327fbd16c8662f3cbddf

                                                                        • C:\ProgramData\mozglue.dll

                                                                          Filesize

                                                                          593KB

                                                                          MD5

                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                          SHA1

                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                          SHA256

                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                          SHA512

                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          40B

                                                                          MD5

                                                                          0cbe49c501b96422e1f72227d7f5c947

                                                                          SHA1

                                                                          4b0be378d516669ef2b5028a0b867e23f5641808

                                                                          SHA256

                                                                          750530732cba446649e872839c11e7b2a44e9fb5e053fc3b444678a5a8b262ac

                                                                          SHA512

                                                                          984ea25c89baf0eb1d9f905841bda39813a94e2d1923dfb42d7165f15c589bd7ff864040ec8f3f682f3c57702498efff15a499f7dc077dd722d84b47cf895931

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                          Filesize

                                                                          649B

                                                                          MD5

                                                                          5076cc24f8c983a51b27897386f97466

                                                                          SHA1

                                                                          b13fe7459c5f78ecd9e250062e9431c6c732234c

                                                                          SHA256

                                                                          12c28cf634a82417cc8b3a15c3387422f46eecfce2e732aea6e4a07acb907f07

                                                                          SHA512

                                                                          d39a923e3c1d3fa14ba1b9d781e50be96ff083e8e25d49be183e01fa40f67c1b0eb6ff609ae2268a7347d2b5e9dc2976f0c304f049b873d380380b7cf249778f

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                                          Filesize

                                                                          44KB

                                                                          MD5

                                                                          7d17033864f82a427dc6c820da5c7813

                                                                          SHA1

                                                                          80017109f456deb57ba5a8a4b2e784f8424a5f52

                                                                          SHA256

                                                                          72e2336dcd669363a8fd57575859440ffd1cd72d9b9ee97cd3850a2475e919d7

                                                                          SHA512

                                                                          b900902a83921bef5d8746ba3b85c5c2bc5853c0487ed5fb0f999d5da96aac4337d76b17366ba9f7a79cc47a39e7f587548dce889b2e08122d384304d99ff956

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                                          Filesize

                                                                          264KB

                                                                          MD5

                                                                          e2041817810caf0ddbfb58b4c8801ee9

                                                                          SHA1

                                                                          13275d37c7d8943e6886be56d0ad5bc37cdfa89d

                                                                          SHA256

                                                                          4032661ddce2b69c742c3c9d0229e52717063350f4889c38deab05a7ff1dc843

                                                                          SHA512

                                                                          7aa97285d142a9765b60a8f725a431003f9f271131793a195893a6bcb6c87d70a0599d30b35106f50b51d649b2a298a55f350d119616a840a171aa4a8f40fbbc

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                                          Filesize

                                                                          4.0MB

                                                                          MD5

                                                                          67b9cb23b20f0ecdcf50bf80ee850f7b

                                                                          SHA1

                                                                          fc64e19f2a629bd3494fbe1f6ffd1d8acc4e08c0

                                                                          SHA256

                                                                          c2f952a78de85399426bd49c235fdab84c5deda05bc60cee272127bf15cce111

                                                                          SHA512

                                                                          fbd3e463818a807fd65d94a45463be8bbf52c2f34de04c239b75258247c481d77ba26334f9114928d9865ac92f843cdae8c376af73d45a858c4e78b4eeaeeab5

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                                          Filesize

                                                                          317B

                                                                          MD5

                                                                          97e2f12170f54214c9aeb4cd11fda49a

                                                                          SHA1

                                                                          8d63f27d06baaea42995affbcf1881f6c6c82bc9

                                                                          SHA256

                                                                          74f5fbd08724bdc2cff071ac6d0bcb15eb37f1b82eb990910d484e237f203f5c

                                                                          SHA512

                                                                          dbd17cc453f5cd1563953de2b409d03b490dd2ced2d8133db55fba56d0dafb2bd80412da57c383c7a439da8dc5fcecca97b0d95c96dd95ee52dc03a8a4bf7cee

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                                          Filesize

                                                                          44KB

                                                                          MD5

                                                                          2892741b0ee35e6e62aa73e4abbaf429

                                                                          SHA1

                                                                          4842581a20db713f434c1ef014d6b99d288a1c90

                                                                          SHA256

                                                                          c121dd85688ea0dc65254f14989d244ccd42af9e5e83f709d6b9ae4049679b7c

                                                                          SHA512

                                                                          8ab8f259da5bdf3ca3ee25872f3c237e02ed27cfd11552ad762263db30009ef8434ab3d0b95bed41f0a027d588c0922efa17bcc692761d3dfcba90329edd6bb7

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                          Filesize

                                                                          264KB

                                                                          MD5

                                                                          d758f1acc54c80fc1979d323a3f45537

                                                                          SHA1

                                                                          816df47e2a8b986062f86740ce2dda7ce270c5f1

                                                                          SHA256

                                                                          ce911ba420965db9ee4da79b586defc94de0b020630eda804c07a80334014196

                                                                          SHA512

                                                                          f0d39bffad8d74ab51b7e021124f8bce6904da41731a198f512b5ab5f637d910cd2fbb96ef525da4890a0c01fb7ee5a7b37c2939d5eaf53e06ee4877099dbf8b

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                                          Filesize

                                                                          1.0MB

                                                                          MD5

                                                                          fe993339a25710ebec86c051941d462c

                                                                          SHA1

                                                                          1a7a578b7a32bbe2102a789c2321090d406838d1

                                                                          SHA256

                                                                          59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                                                          SHA512

                                                                          b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                                          Filesize

                                                                          4.0MB

                                                                          MD5

                                                                          d6b0609c4b6edb45553ff9afbfc95e33

                                                                          SHA1

                                                                          2697657b75906d3653f48080ec1f3993c07bd8bf

                                                                          SHA256

                                                                          eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                                                          SHA512

                                                                          db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                                          Filesize

                                                                          329B

                                                                          MD5

                                                                          64df587f801e58abffa9c45811aaf3b9

                                                                          SHA1

                                                                          c72d25a0a317c2a64d54867f955d6862546fda9f

                                                                          SHA256

                                                                          c3ba4f332d4e992c8f27ff9767b47cfbe1811949450bff9a358899708cad8e39

                                                                          SHA512

                                                                          7d17e2f4aa0585589480b9e801cb9f8b1df9aca6c6603381f5dd702b1983e379cd6c7419365588ede82f32497d1d7613c759998e8740ec0b9073a9edc15ea415

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                          Filesize

                                                                          2B

                                                                          MD5

                                                                          d751713988987e9331980363e24189ce

                                                                          SHA1

                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                          SHA256

                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                          SHA512

                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                                          Filesize

                                                                          336B

                                                                          MD5

                                                                          ea95fc1328dc434f2cb91fc8f2980471

                                                                          SHA1

                                                                          3779157e6a95d9364dfc30c788971de5b9c846b2

                                                                          SHA256

                                                                          c8c7616c24f58d3af7e87854350f27b34f2c7d229123990abd05bad2b2ee8301

                                                                          SHA512

                                                                          2a28f5517261babbb93d0e50c1b8df318bd34a44c376f5b5c76fa607a1c3581139fcfa448f8769ace5d8e8637a8a4178147be126257217b8787f1aff9d41ca29

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                                          Filesize

                                                                          308B

                                                                          MD5

                                                                          4e7982b86b3d7d916b7722aa3b3f0669

                                                                          SHA1

                                                                          ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd

                                                                          SHA256

                                                                          cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340

                                                                          SHA512

                                                                          c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                                          Filesize

                                                                          317B

                                                                          MD5

                                                                          e926fcccc9437f52e46e8c8f23690aa5

                                                                          SHA1

                                                                          8a572d2620f00d5904895cf65275791fd7f50436

                                                                          SHA256

                                                                          0ada3be949174a24dfec9e0190d91ada2325689672be6d7ac2a780c5f480df69

                                                                          SHA512

                                                                          e142531468b19807d1e8536512b280ef2d078e5da248c6475ce85e8f11c54d62b7b1507b41ffb6b5401d858ca5363963c7809aa9d7f6bcdc3197b43b062dd059

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13377348165210049

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          d4b73542feb113d1c3e15f82236f8a49

                                                                          SHA1

                                                                          1003f74b56f257b58b7825c9b9e95ffd87a370ba

                                                                          SHA256

                                                                          6e9118d9939715c1aeea1aac8f3e748200847effbc3739ac116265a0205533ce

                                                                          SHA512

                                                                          09e69d7eeb929c20a60bd0c98f0d6f59916a1e7a390b0b7780d6c6eab2e62a5e632adf2786c9a60fe651238aeafba565c2e69095d49ea5870dd4d48318d7b4c7

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                                          Filesize

                                                                          345B

                                                                          MD5

                                                                          7e0336d8b3b96588e08aa36e48639065

                                                                          SHA1

                                                                          56ce2d67885d36ead2318131a622c7f1395e3ae3

                                                                          SHA256

                                                                          60a9d14704131dcef3964f4b48f165c30542151a273b8e8919da9052cfa1a661

                                                                          SHA512

                                                                          653e1cff626ac9264ec14a1d3be8c6f314f826ea0a39b9bf7ffba18aa015f67effe7d3e95700413125dc3c71f6362171c2293d5f43a1f349ad7515e12b6e3b1f

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                                          Filesize

                                                                          321B

                                                                          MD5

                                                                          a460f6f803f99d4eb08dd2aa932659e7

                                                                          SHA1

                                                                          a264e331a6a861fac8c61e6e85301f0679b36a42

                                                                          SHA256

                                                                          39e4a22d8506f4ac1d9b99a1ad0344ef435a4d21336af4171646f1f34e997836

                                                                          SHA512

                                                                          aef905ecac702da46cff8026379013d68b8774a3edc4aebf4c17b775b3871710d2242ded025ae6650270425637e11ef638d8ec40e5bcde287fd02997f9402687

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          042d78ae49974378d6521749e41c5827

                                                                          SHA1

                                                                          5e76a4df060d2d0b021a25e1657d8e841a5e1469

                                                                          SHA256

                                                                          a814878a81c2af0382e600019f84cfb9d568ff2e50a3405e53c0c746b89feba3

                                                                          SHA512

                                                                          c8d39a7262e1905fb88a414f6f228efd3cec7f991b4da7287347d12671fd36d3ebbc6f9e9dc43165cd8d42a0203f4bc7dd7920e4b0eef92417744d5fe039d399

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ef43e29f-482a-49c5-ba6d-cc547a9a3335.tmp

                                                                          Filesize

                                                                          1B

                                                                          MD5

                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                          SHA1

                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                          SHA256

                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                          SHA512

                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                                          Filesize

                                                                          18KB

                                                                          MD5

                                                                          d343d6b643b42e11aa6a42a7f1e52ba6

                                                                          SHA1

                                                                          aaacb9a3774e2c1f3887aa90b1efc6db689d2208

                                                                          SHA256

                                                                          13352cbb8dc5bb16f3933cfc6add309a73cba585a91ae4373bbcfcaa51baad7a

                                                                          SHA512

                                                                          17a32f51c359cdb7fd1cebdf7a7ef4db2bf59b7200866a0fa60ec3c0708b1203495932eff51e3284d8a79c34f06f9a900e2073387d21e3172216b7fd766a1c76

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                                          Filesize

                                                                          317B

                                                                          MD5

                                                                          9a825ab4f028e84105cad7d53bb9b089

                                                                          SHA1

                                                                          0ad47469dea5dba3ccca50a81b07b86668b7d986

                                                                          SHA256

                                                                          348676535bf4db98831b3830b4d7284286165262b24bc25e7e0d050492ac1352

                                                                          SHA512

                                                                          658f29d1bc1f368d50fbe354babcdb649062d5fc8b85585d77f0334e905239b3f4dde7aaa28c6ba96091b075e495d1287518f94b9b46a8323b3db344fec187ac

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          a6c2c5cc285b5d72192ce84ae5e06bcf

                                                                          SHA1

                                                                          1efceb3580ea1ddca06d9249cf171b02ffd8d891

                                                                          SHA256

                                                                          c6cd34b6557c0d95dcaea8c800dc54f2fddcd49c085e3fb2690ca6edb550838b

                                                                          SHA512

                                                                          f5f571fa154e9e51f997c857609dbddbd00e94a999a37531a16bbcb3b5b57bb6ac732c0fa963b27b349c3a600da1435872ec7bf6172f909101555e7046bdc2e8

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                                          Filesize

                                                                          335B

                                                                          MD5

                                                                          7eaae5e861f6c689b44b82cb4eacf3a3

                                                                          SHA1

                                                                          06c7e2719eeb7a39f1746f380dbe363bebb09a36

                                                                          SHA256

                                                                          3ba7176ee4fec9351b6d43148cdec9b83184f53771bea7ecae928606de8e554a

                                                                          SHA512

                                                                          1dfac0d77576256d6252610197a21eac87e702bd5c9dba8235b2d5a65d1e10594f3c2f0e5f58a18c479bf37f4f799246d66b96ccbaa6ea728b86ab8f9724b4de

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                                          Filesize

                                                                          44KB

                                                                          MD5

                                                                          4d38bd1eed9c9544f431e27ff413a9c0

                                                                          SHA1

                                                                          f1cc4a258277c256e280fe5436f48731ec22b3d2

                                                                          SHA256

                                                                          39f1aab833cd5c4f9586339d1c61f3d4f124f6ca6cd8f63109f9e1688c462f9b

                                                                          SHA512

                                                                          578d8830b772ddc6b6bb7a3e6bd307af0edd3f6d3cbd60dfad463ea804b30c31ca1af30989aee73c7c705a0dde86e4b668517ff4e48b4c52068fe44cd99e59f6

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                                          Filesize

                                                                          264KB

                                                                          MD5

                                                                          ac928866fb1e576b47335c844038ee40

                                                                          SHA1

                                                                          6e9ef2ac1165e23ccb211a5b1f4aba8f1e632d60

                                                                          SHA256

                                                                          45017d5f37744146b9fd45bc0813ad88abdba4f07bfebbd6fe6037235f193e10

                                                                          SHA512

                                                                          1352c56fb9e78120975811bd6b45d7abb9cbd57624066c359656ed58de556adb301e0665e24a8757d6e75e20a6a0526482252b1a39e2859315fbedab8d7624ef

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                                          Filesize

                                                                          4.0MB

                                                                          MD5

                                                                          e39f95ae48a87705c07abeae9503e503

                                                                          SHA1

                                                                          7780349ff35b9620ac9cfbcf777e193c57b12802

                                                                          SHA256

                                                                          509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75

                                                                          SHA512

                                                                          9e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Browser

                                                                          Filesize

                                                                          106B

                                                                          MD5

                                                                          de9ef0c5bcc012a3a1131988dee272d8

                                                                          SHA1

                                                                          fa9ccbdc969ac9e1474fce773234b28d50951cd8

                                                                          SHA256

                                                                          3615498fbef408a96bf30e01c318dac2d5451b054998119080e7faac5995f590

                                                                          SHA512

                                                                          cea946ebeadfe6be65e33edff6c68953a84ec2e2410884e12f406cac1e6c8a0793180433a7ef7ce097b24ea78a1fdbb4e3b3d9cdf1a827ab6ff5605da3691724

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                                          Filesize

                                                                          14B

                                                                          MD5

                                                                          ef48733031b712ca7027624fff3ab208

                                                                          SHA1

                                                                          da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                                          SHA256

                                                                          c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                                          SHA512

                                                                          ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                                          Filesize

                                                                          86B

                                                                          MD5

                                                                          961e3604f228b0d10541ebf921500c86

                                                                          SHA1

                                                                          6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                                          SHA256

                                                                          f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                                          SHA512

                                                                          535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                          Filesize

                                                                          552B

                                                                          MD5

                                                                          82dfe7690446fb3293cbb2196a0c0154

                                                                          SHA1

                                                                          3e85a0100bd736d8b4b71d10bca125c700950873

                                                                          SHA256

                                                                          ac69d55f946ec12487dde3d5b562634f1333eba4c1f86f4900884bd6437d54e5

                                                                          SHA512

                                                                          e1881bcb61635dbe3bd811da461c9be364093c60c1ea41b019aa0b8528b28037d8284d632ed70d262f0c7ff4c41991eb99c4fbc0d6ce91ade2d7b74f64115d33

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2f107c06-cc1c-4728-b39d-93fb286237a1.dmp

                                                                          Filesize

                                                                          838KB

                                                                          MD5

                                                                          5e0a67a959655a64805b75abb855df40

                                                                          SHA1

                                                                          da98b3c6e408543db983b6cce6d387aeee540743

                                                                          SHA256

                                                                          e055378329819276998a5fc0cb4e868c76c18298d1ba82fe934b5d5e551bb6e0

                                                                          SHA512

                                                                          afed1ef2294e43ef97fa6abd8cfabe9df62135ca501278d434f7d6ca303d480c325072a2e2a863bea13f0a4520f23bce9a2bac3f07c808c8d310f2ca5b91d80c

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3e312010-e41d-4fc4-8e23-839166d8745a.dmp

                                                                          Filesize

                                                                          826KB

                                                                          MD5

                                                                          5402ec1be0649ed6dc3f3e8805bdc081

                                                                          SHA1

                                                                          fc5c250d11a7ba352d740577f295271120c1db27

                                                                          SHA256

                                                                          83928c9e103611c09a11f5047a79998d6b669186c42feba947a73133af6473d9

                                                                          SHA512

                                                                          029d84a5a62cf62c0210d3dcb9a306f27f66153d7ab23462f835301eca4977c636520cdcc3d7e0dcf7623195b8371c46d5f78b0e299aaeea24a87ccab8873f46

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\470d4d42-4529-44e6-ad61-3943b65f4ec4.dmp

                                                                          Filesize

                                                                          838KB

                                                                          MD5

                                                                          4ca578a418919c7cb0af9de97f1fcac6

                                                                          SHA1

                                                                          5dd215a60eeabb2db805c9fc6567679d002f6b6b

                                                                          SHA256

                                                                          7fd18716c8bb45c869ecd4309252f0632836118f322fdbbc26f9126e853fba35

                                                                          SHA512

                                                                          93f47aa55c4130f232cd3f20ae80ac1286778a0ad5c9479f196169a51502ca35b4431fa4e181e5c127c62f3b907b4483fef135d846ebeedbf3b6344aad72e2e3

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\78ef83cb-fdfa-467a-8cd3-70737c299142.dmp

                                                                          Filesize

                                                                          838KB

                                                                          MD5

                                                                          057e6834fc948bc3598d6734baf277b8

                                                                          SHA1

                                                                          13a84ebee41f9448592123607f85d1bfe8dcae8b

                                                                          SHA256

                                                                          762037b831547f15bd5a7df25b857ad2c4c5935162fb25a65b3367800da9ab0d

                                                                          SHA512

                                                                          e4d16a18d636f17b4efb97ddae7ece5a9e707604322ef02e19ff1a75fb5ff7a55626712cca1416979c610aeeb65b2bc2883d729160a1ff23c1280010ea1865d8

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bdc7558c-4ab4-45f6-b38b-a552543e586d.dmp

                                                                          Filesize

                                                                          826KB

                                                                          MD5

                                                                          910adba82c0cc8d2e756fae0420f45ba

                                                                          SHA1

                                                                          e33b965764fafcfdeb343396a7092ef348cfba06

                                                                          SHA256

                                                                          7a919534803a7fd607dbde6cf48043055469111276c8d9dbb31e7ac1a7285f54

                                                                          SHA512

                                                                          5a9e032c1286d745128c17509c6e41babdc1bc48738c4cebd6cbca4fbb6ee1dae93a94fd30967e7f80409dcb5382f320dd45d4fd46be0bc8b51095462c1fd236

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\daed30b9-0aa0-4936-925f-abf3793a5d3d.dmp

                                                                          Filesize

                                                                          826KB

                                                                          MD5

                                                                          674f02d3f1a4ca28a1a510681a256aed

                                                                          SHA1

                                                                          3bc13f38bc58cdc27a77b240c65853e55e4c116d

                                                                          SHA256

                                                                          70fc2508506882893a6f32318e38a493ca29e140849b5247c06b1fa2f619d0aa

                                                                          SHA512

                                                                          d9d7a367f7c9e3516e7c2494c2339dc1860b6e26d2280ae7c2356125b1927c9c60fa96f8142947741b8ff2bb8adb78d0f21ec41a8038dab20117845f378faaaa

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          536aa54d793d716772bcc5c076e6f261

                                                                          SHA1

                                                                          fb61697f038beb72e1b9380ac3ca59c582907c88

                                                                          SHA256

                                                                          e263a07e3b0a8654aa06eadbe2233e104d8fe70cf2d16620b8a9fb5f63a7477e

                                                                          SHA512

                                                                          0f7a6e1d35753fb4e5cbea9278fd91a9697b728a9b32ed4d8d74558c36d5c75952696d4174c4a60b71fbc6d43b322a1107c4d541cf828934e7dff727e9c5c52e

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          c2d9eeb3fdd75834f0ac3f9767de8d6f

                                                                          SHA1

                                                                          4d16a7e82190f8490a00008bd53d85fb92e379b0

                                                                          SHA256

                                                                          1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                                                          SHA512

                                                                          d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          e55832d7cd7e868a2c087c4c73678018

                                                                          SHA1

                                                                          ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                                                          SHA256

                                                                          a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                                                          SHA512

                                                                          897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          101035db33eb3b2d567c9f05ce277c41

                                                                          SHA1

                                                                          2b1d3abdfe7c2d53d8e6cd3281f57d215f6e69f3

                                                                          SHA256

                                                                          897ddae557e8f526ffe88df27c299bfcfd0132338ebb3cd236c781673f27201c

                                                                          SHA512

                                                                          41ae568003f86e866bf409feeedfa338cc97c99437715cf8904b72d7a4d0153873f8dc0b30f2147a829c71f34d8152f8ce340f1737a93e6d4e30e88ee0af0dca

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          fbf64f6d981e048886bcbe2cd2d26173

                                                                          SHA1

                                                                          c49988246cce3d9249310eb20a3cc0decefc0ff3

                                                                          SHA256

                                                                          7e06a1fda63c65535e61224174b69c8c728b831399770094f3b03625839848e4

                                                                          SHA512

                                                                          1ee0692ef01f95b5302ef2898e48738ebc031aaaab42f018ad58215f2deea4c5d801057bf373df59c6c3cbf78a264e581596e51fa39eb8365722a133f8d377d6

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          7a08ac1fb8c076115fc7c5daa1bf0ed8

                                                                          SHA1

                                                                          dfc238c25ce635947c1945c1e1a720f6e303a831

                                                                          SHA256

                                                                          314313f2be7b9f76b5b9258a9448353e418de04f564e3664737cacdd3461a3a7

                                                                          SHA512

                                                                          528f2928619f20547f3f8d36fbfa42cf42786d9412626d091027474a4d7cebcf999fa264c576cd9029dad353512552619213110637765af4e642c338f352744a

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          d810678c8f27235888340d2afe137c6f

                                                                          SHA1

                                                                          318ceba4a9a4999d81e9d16d9c5bb9f48d773448

                                                                          SHA256

                                                                          81dc914576f7e80e2316f480aa6bf46188da040d63981ae2b30b7c436e4bad89

                                                                          SHA512

                                                                          abb1f43cf78696f24b079d771b586b9a85c9a0bb29441495aeed97cb4d40cf6b41266ac44975767c129bce78507814708e25f3e1e3b2ada95f3baa4de6f3501f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          72807ce2daacbd042ce40ddf482db017

                                                                          SHA1

                                                                          6c253d631f5b04491503f398a3c6cee054c2ce34

                                                                          SHA256

                                                                          21fed05cd6289e7bc5383a1cca68db4e319bae2bba574568f70da9588dfabb42

                                                                          SHA512

                                                                          e9601d85b29930f16d5f4e2f37d528bd0336ba8c3d8e7488d38f5367805e11069be56bbdb1a6106a52a74d564edf32e0951de1e77e41fbb0930d2533c7825ea3

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          1e9cebaa68a6c910f0938155ad5dd412

                                                                          SHA1

                                                                          4a764c0e2614ec6b6b18bb13ad00e9f05e3cc482

                                                                          SHA256

                                                                          36f622b8e3de85eb73224a67dd45c08e5e9d8acabea40853ec1da121ce542dbf

                                                                          SHA512

                                                                          e4c71b7d43264fe9ac2f4fdc883ed8bba19a916cf26b1f78c4ccb47ef87e139785c712f89321d241d2cc5ce6c692acc1b5ecd4ac13076af4cbd2a288b52f365e

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                          Filesize

                                                                          264KB

                                                                          MD5

                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                          SHA1

                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                          SHA256

                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                          SHA512

                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XH3Z2ZON\download[1].htm

                                                                          Filesize

                                                                          1B

                                                                          MD5

                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                          SHA1

                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                          SHA256

                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                          SHA512

                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          32b7f57c28352f2c87dc479bf7c09b17

                                                                          SHA1

                                                                          9750e6200deb0cc6d4a8734068237f70b9443dcb

                                                                          SHA256

                                                                          a4def76c87e4133ba69d1841fd434d07b14c9361d41d8b6e6c4b5512d96374f4

                                                                          SHA512

                                                                          71519c67dcd52c1a3f438e50ce8b82dcba86f5d9ff8d413edf8c447da9c76fa08620ace80a6a5b57ec56ebe275e26cc015a8c365fd554fd5f52169ab399fbdbc

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                                          Filesize

                                                                          13KB

                                                                          MD5

                                                                          e8d7f6b01cf55d54ade9817c101028d9

                                                                          SHA1

                                                                          0112ad144de210c9c0b4c743564d03d227242e36

                                                                          SHA256

                                                                          f82200d7edaecd320c30a2989a89ec53da14ad9acdd4bc3c0efa1662269deb06

                                                                          SHA512

                                                                          458ddbaac255dfb9c1f57e0d1ff58dd8f3f887cdd474517415563bdb7ba388d1e1c9120e402ca71da4526dc88b59d011dad2eb1bdd72647e30e4c4ede01e3a78

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe

                                                                          Filesize

                                                                          16.7MB

                                                                          MD5

                                                                          ef4b5e4dbb0c0cd9c261b1ca7a90e1f1

                                                                          SHA1

                                                                          916f9b604f06c0879624e5b0da50c845f8881e34

                                                                          SHA256

                                                                          b84004b60d9ee0ef798bcc43f8344f06bc775198e04b707eb98f79d6260895f2

                                                                          SHA512

                                                                          af86b1e0eebcfc246d80be6882b55dfcb1f1594e846a584faa49ef7cf7f9f8f1c58e4607805bb474ff5ec8bf5265eb1d8e8ca490bd444196970794b9a632930d

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010209001\caab8b0ee2.exe

                                                                          Filesize

                                                                          4.3MB

                                                                          MD5

                                                                          3a44a15ae7908e31bbbb75cb4a22a56c

                                                                          SHA1

                                                                          8fdb1dd551b1f372457954e8e53f22794723fc93

                                                                          SHA256

                                                                          edad67ac0858b63c585a760def13dafd32aca846757350b214c53cabba82d2fd

                                                                          SHA512

                                                                          202d905b005d38b71b99af194fb464d3d3722d6c6cc190a1c2cc979128da5bc55a376144888304d45e756c52794dacf4656798e6deaad6254aa5b6b25250be33

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010210001\39c8bb5ec9.exe

                                                                          Filesize

                                                                          1.9MB

                                                                          MD5

                                                                          d7ce03e79c734ce46004970dc6f9514c

                                                                          SHA1

                                                                          7e9229d8e0610a4d83fd3526e6ba8c626aad3aaf

                                                                          SHA256

                                                                          968dcca3833c594e55d86915eb1cdd873d04fe8716d1e9a552c36489c4b1cc20

                                                                          SHA512

                                                                          d7f2d02502680c6b54cd02f058b3909d729f30b518fb196009bc5acbc4b1b1b9441e7f889a3ddff99c90be1a94404a042d98fed50262379964644517ac1faed2

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010211001\a5ae839562.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          d5791c7f044cd36395b3c15fd12bbd7a

                                                                          SHA1

                                                                          303d4068564e94bf2ded0859f434a36a19bd1334

                                                                          SHA256

                                                                          b75530fefc63410caf18ab4defdf369f515ec6eefd2fb9c02848b10e83589467

                                                                          SHA512

                                                                          b5db5ffdf5b75262f90e2a8ac44f3cffbadfd199ef1247b36ed2d6de8784e90ce9764707f58201122d6266793dceddd9959df54b12cf2477b7aa39dedda9e8d0

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010212001\5ddbe7471e.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          bb6e33aaae591a57eff63ba609412c4d

                                                                          SHA1

                                                                          5fb313e8f2aa709653c8efab33fa1f224a7b66f3

                                                                          SHA256

                                                                          b38f93f06df26d55ca76cc6002600eb3d997669290abe78eb54c6c14665256a3

                                                                          SHA512

                                                                          06f2e156365a23f00f4487160f5b393e9b05e7137c8dcac7ca583f6cc3bd949ec46a815899cf7e4d9bdec26de04bc94eba09bd0883ded1d1835e46368f2c1e0d

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010213001\ad9e1ecec0.exe

                                                                          Filesize

                                                                          1.7MB

                                                                          MD5

                                                                          8a55c1458416c531c6b01852c305918c

                                                                          SHA1

                                                                          1c70d7aa20d05071dac6641501550d14bcb57e13

                                                                          SHA256

                                                                          8c6ad81b20453002ae6d1c0d1676dbd008359763b420b76bc710c26945950d6a

                                                                          SHA512

                                                                          52b5a7ebb8bae55cdd5b2435890982286f1bfa912ae572aa9e2584363d5e213e0d46d9cfcf6ba50a96f8b06287738b066237298f10fd91e4417e1ece74acdf50

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010214001\e592570745.exe

                                                                          Filesize

                                                                          900KB

                                                                          MD5

                                                                          2a6698f05a7a2a7e65407b0edc6df9da

                                                                          SHA1

                                                                          b1d94d4a4e3b36eda5af8407945069fdb02e0403

                                                                          SHA256

                                                                          e8bb39945a88f119d3a6b6147b61de1974e7236eb2baab6aabf8ffbfcee8658b

                                                                          SHA512

                                                                          e14357e037996f28bf0249d7654e77796f6424607d994f5495f7655e1af94e254d8e7b58cd24cddef39dad18ce346ef7d4e7e74c1d061048fa61e95519a70034

                                                                        • C:\Users\Admin\AppData\Local\Temp\1010215001\40a37c3682.exe

                                                                          Filesize

                                                                          2.6MB

                                                                          MD5

                                                                          2683bb3612aec1174990242e0f9156d1

                                                                          SHA1

                                                                          d6f2378a363715aea1a03dc03ce5f6ab2ee2633e

                                                                          SHA256

                                                                          de9ec6ca1796da229a778b33145151053739823c2156c496a128b1133b4a77c6

                                                                          SHA512

                                                                          b9cb60b177f28786e0e33c03714a2cf52186b37e9c2f780cee723f90db549b618bcba091da8067f0f3efa447edb2dd0e3775a8c876744447c576bc34cd31f432

                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          419409ac948f88109df5953921297526

                                                                          SHA1

                                                                          742671ca1a33cc6471198796f4b2d105f935dbe0

                                                                          SHA256

                                                                          a02c34fe8af96d774e11aff52237a194fdb446eba979e5c2d26e3776b0bfb6d5

                                                                          SHA512

                                                                          8efdd977dd3a6ea1eab7c504802e26ac95fe8db8cc132c92a04501b72f2ff7b308dd18c25000e983e7f816e53bab103e89fa6ac644b1f058b8736421cd7eb394

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                          Filesize

                                                                          479KB

                                                                          MD5

                                                                          09372174e83dbbf696ee732fd2e875bb

                                                                          SHA1

                                                                          ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                          SHA256

                                                                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                          SHA512

                                                                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                          Filesize

                                                                          13.8MB

                                                                          MD5

                                                                          0a8747a2ac9ac08ae9508f36c6d75692

                                                                          SHA1

                                                                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                          SHA256

                                                                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                          SHA512

                                                                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          7d2cf6813f1875a8713279da0d653a4f

                                                                          SHA1

                                                                          83e84412898fc74cd5ba5ac235f670e6a698b905

                                                                          SHA256

                                                                          d5e0bc271e068c6ea337ae7a62f08a8b62abee131532993b745b394539f31c23

                                                                          SHA512

                                                                          3ccd28b5e74fffd191211238bd7d53325e74355374b9c94a7c4eaae54745c2851334a7e3f211f5ef91b204dce1ab09ceebe1b3516ce1c4da6080248801a33040

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          fc34ff1c65c30461dbf0fede810cf577

                                                                          SHA1

                                                                          6a3d572e7201847a86053f09b90e3186575d7e43

                                                                          SHA256

                                                                          ed5ef4113fd82ba37b262ae5aa2fbf24995f3c0672894c8c74ab42160e88f8f3

                                                                          SHA512

                                                                          e2cdee6ac0d8dc676f1dd0d080d4956e028217afa29f595c77ebd66a789fa8babe0500c82c4e74a2b367275be6fb444e2b379d2e33a793fa66d2310a1291447a

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          086ed48b610a31d20d447a197ab6aa8a

                                                                          SHA1

                                                                          ff045b373092c769a64fca40d9792d51ecc8a985

                                                                          SHA256

                                                                          414713dbee9d58388afe72bd3e2225df39a999d7e38dbf9a56e7a56542d2d66c

                                                                          SHA512

                                                                          ad08e888339ff1230b3714c806f1fba83d33ca53c0eadfa3f75deab2f33c35cb2b59515f2d1e4b3e04ea9dea2538050dc3de764ff97f093f99eebf8f63c87899

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          15KB

                                                                          MD5

                                                                          619a90a154b8bbe85d652373e16ee13b

                                                                          SHA1

                                                                          4764fa0dc7034bdb4f8e3647f98257a70dbc068a

                                                                          SHA256

                                                                          299695156071659466136e4f5cd2e2f57834cab1da35e14a1e35ae354305778e

                                                                          SHA512

                                                                          dca2fc5082e01739a19f126aea5cc2ec065fed0d56478ef9925d0afaf806fa89f783e36d0c14f2b623036dead12df9627d85b29ef9b718c2e41a6b5ce91b4e06

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          def4f9facfbd069a2cccb4e0773960b7

                                                                          SHA1

                                                                          f62b69affc791bb0841c78ac23bffdeab5299e02

                                                                          SHA256

                                                                          2e9c24aeb1c84f75351168b232fcb9a6a5203202cccd934559143f26bf1f2f4f

                                                                          SHA512

                                                                          47df14bc949470f39e8682f9ce4a0f62326fd0a91c932554c6e2073d303ee514260522ec6b3a400cc0feb5a9876b61642124e9f9fe454c69558a246c7a270eba

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          05d72f097c7e7057e92344d003e298c4

                                                                          SHA1

                                                                          7458f9df34d97a5e431acb04b21840a4d25144a0

                                                                          SHA256

                                                                          3044e713082464176fa7dcab1e66ec358d1cf2f3c45d3c6e129faf72eca0a012

                                                                          SHA512

                                                                          975a8142ff12fb1bcf44849c25b0b689d64dcd7279a9104fe4da6c9ae7bfe6a987a9846dfac710acad33ef7bda26fd3af62fb1231ec0e767686f30d0eda20e2c

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\295a9afa-feea-4684-84f6-8df4f9b630ef

                                                                          Filesize

                                                                          671B

                                                                          MD5

                                                                          8d185f2b833a624b775b379a8e6161c3

                                                                          SHA1

                                                                          a3817744d67e56df6818505dc0c9976f6677397d

                                                                          SHA256

                                                                          5f8c306cebcaf15541911a5c72caea9f5399d0026f9d0de28137b11dac200147

                                                                          SHA512

                                                                          393772e02210755862a2aa1bbfa95e55598c3759032ffe4232dce473de7f48cee5e305743acf2b613473273bccb958ffce36432c4317c094f2c1fe93ffef6fb4

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\815ccb78-75ad-4b15-ba76-ade07228376b

                                                                          Filesize

                                                                          982B

                                                                          MD5

                                                                          ebde0fd3493985a0d12f8a527caf466e

                                                                          SHA1

                                                                          2cdbf6ea9d1f3b00ee5702827f953b9e5f8c1428

                                                                          SHA256

                                                                          7a157e9d94bc6272040ce1ab3e99c9898cca0369319230f8ac438b6e274835b3

                                                                          SHA512

                                                                          d1f6aaa96fdb478ee2b86f0813fadd08472a4ccd2d6c2d5bdaa654dac53a9095c997862920216954304f71c610589ca442a3d77cda42746d7017466b7d642c10

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\ed7ed137-44d2-4384-9617-91f71e1f949e

                                                                          Filesize

                                                                          27KB

                                                                          MD5

                                                                          319f2b39802adf2fe30b0b4b3e4ed5ab

                                                                          SHA1

                                                                          5a75774d751c284850cbbd989c2919d12e7a7667

                                                                          SHA256

                                                                          221ee12a1343a496ab1c09df052d2ae1434b13bfa4773a5ea9dbf1924d419e88

                                                                          SHA512

                                                                          59bba5de65f712b1ffe0838c0d787566d204f261e3154b3fb7490e57152b964c5b8413e7b885a5f25235ac629f17a1bdf0b1d0fc1b9fc2c63f62ca8004aa7ce9

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          842039753bf41fa5e11b3a1383061a87

                                                                          SHA1

                                                                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                          SHA256

                                                                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                          SHA512

                                                                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                          Filesize

                                                                          116B

                                                                          MD5

                                                                          2a461e9eb87fd1955cea740a3444ee7a

                                                                          SHA1

                                                                          b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                          SHA256

                                                                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                          SHA512

                                                                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                          Filesize

                                                                          372B

                                                                          MD5

                                                                          bf957ad58b55f64219ab3f793e374316

                                                                          SHA1

                                                                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                          SHA256

                                                                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                          SHA512

                                                                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                          Filesize

                                                                          17.8MB

                                                                          MD5

                                                                          daf7ef3acccab478aaa7d6dc1c60f865

                                                                          SHA1

                                                                          f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                          SHA256

                                                                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                          SHA512

                                                                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          6c31e121e76fe438bf9d5e3498817471

                                                                          SHA1

                                                                          4cb0e3ff7d61209e9f5d91f11a56a018f9b9ab85

                                                                          SHA256

                                                                          318e50ebeb012b0c4be0c433e2374bddc0857f092de9c4aa5c583f12dec723e7

                                                                          SHA512

                                                                          bda977d01ec496a6eefb474f915b60a4eae3b568b2025f7a38c54fa065b1d9cbaf5939ca6da0eba1696537b7d4d8cc1b7ba277b09567e16e260e654be4696817

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                                                          Filesize

                                                                          15KB

                                                                          MD5

                                                                          6cf97cec2b0cf6741ed45c11db870a87

                                                                          SHA1

                                                                          0de1e9f864e5762abe8b50558637b7061c740141

                                                                          SHA256

                                                                          6cf20f8118b58cebfe9022ff6bdc07789acabdc1075fcb7aa322c4493b20a331

                                                                          SHA512

                                                                          bc9c5204c98daa154ec4f2aa505ca3ee6e3c55ef171ca48c380442328c3d92e935c003f07c129fe39d67aac809c6818b259b4f96164512b22b863ff01d30e82b

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          46fbc17813ec14c8671cc56c459833ab

                                                                          SHA1

                                                                          bc2925032863129213fb1147c126b31a10371eb7

                                                                          SHA256

                                                                          b65bfae1493b9f7d071e3233c17d73c4f3e7cc53c185ee6215cd441020efd257

                                                                          SHA512

                                                                          3cc41b3b9e32ee4a80191a5e963bb6794ba3dece8fd24b4d08f46612c37ef5de5ec84d7e14f2357114af7176ca7e0eb93bd51aeee49e4edc81af8f71041d862a

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          5e29781cb34600fba3119e7c26d687e3

                                                                          SHA1

                                                                          d3b30139a3b4d7586d04acd4c6b4a99e79f9eb51

                                                                          SHA256

                                                                          9c3aa0d12d77e992ac08946b2c21937e367238c4699132c9793946ad66a2e7e0

                                                                          SHA512

                                                                          ec5a354a4b5d14e2a40b1410f407a5371708ce629bb78f944d674c02e4f59246765e5a50b5b2010e19ebb942e0b2daa12bd64257570eb4d388afaf349996a44d

                                                                        • \??\pipe\crashpad_2644_UVBFUWHZNONAHIOX

                                                                          MD5

                                                                          d41d8cd98f00b204e9800998ecf8427e

                                                                          SHA1

                                                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                          SHA256

                                                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                          SHA512

                                                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                        • memory/944-24-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-4170-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-3866-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-44-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-1068-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-111-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-1356-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-26-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-4169-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-22-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-25-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-191-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-291-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-21-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-19-0x00000000003D1000-0x00000000003FF000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/944-16-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-4159-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-750-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-4164-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-20-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/944-23-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1216-18-0x0000000000260000-0x000000000071E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1216-1-0x0000000076F24000-0x0000000076F26000-memory.dmp

                                                                          Filesize

                                                                          8KB

                                                                        • memory/1216-0-0x0000000000260000-0x000000000071E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1216-3-0x0000000000260000-0x000000000071E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1216-2-0x0000000000261000-0x000000000028F000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/1216-4-0x0000000000260000-0x000000000071E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1236-45-0x0000000001AB0000-0x0000000001B20000-memory.dmp

                                                                          Filesize

                                                                          448KB

                                                                        • memory/1236-65-0x0000000000400000-0x00000000014C7000-memory.dmp

                                                                          Filesize

                                                                          16.8MB

                                                                        • memory/1236-688-0x0000000001AB0000-0x0000000001B20000-memory.dmp

                                                                          Filesize

                                                                          448KB

                                                                        • memory/1952-162-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/1952-238-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/1952-113-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                          Filesize

                                                                          112KB

                                                                        • memory/1952-741-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/1952-103-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/1952-163-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/1952-684-0x0000000000400000-0x00000000008C1000-memory.dmp

                                                                          Filesize

                                                                          4.8MB

                                                                        • memory/1964-1085-0x0000000000900000-0x0000000000DBE000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1964-1084-0x0000000000900000-0x0000000000DBE000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2312-1025-0x0000000000380000-0x0000000000A10000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2312-536-0x0000000000380000-0x0000000000A10000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2312-1086-0x0000000000380000-0x0000000000A10000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2312-241-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                          Filesize

                                                                          972KB

                                                                        • memory/2312-232-0x0000000000380000-0x0000000000A10000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2964-207-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2964-211-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3172-201-0x00000000007D0000-0x000000000144D000-memory.dmp

                                                                          Filesize

                                                                          12.5MB

                                                                        • memory/3172-149-0x00000000007D0000-0x000000000144D000-memory.dmp

                                                                          Filesize

                                                                          12.5MB

                                                                        • memory/3180-290-0x0000000000A70000-0x0000000000F01000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3180-781-0x0000000000A70000-0x0000000000F01000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3180-292-0x0000000000A70000-0x0000000000F01000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3180-751-0x0000000000A70000-0x0000000000F01000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3180-198-0x0000000000A70000-0x0000000000F01000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/3980-105-0x0000000000680000-0x0000000001287000-memory.dmp

                                                                          Filesize

                                                                          12.0MB

                                                                        • memory/3980-62-0x0000000000680000-0x0000000001287000-memory.dmp

                                                                          Filesize

                                                                          12.0MB

                                                                        • memory/5308-4161-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/5308-4160-0x00000000003D0000-0x000000000088E000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/5440-724-0x0000000000FD0000-0x0000000001282000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/5440-1049-0x0000000000FD0000-0x0000000001282000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/5440-742-0x0000000000FD0000-0x0000000001282000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/5440-743-0x0000000000FD0000-0x0000000001282000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/5440-1052-0x0000000000FD0000-0x0000000001282000-memory.dmp

                                                                          Filesize

                                                                          2.7MB